| Release Date: | 2016-12-06 | |
| Impact: | Important | What is this? |
The (1) ioport_read and (2) ioport_write functions in Xen, when qemuis used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
See more information about CVE-2016-9637 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
| Base Score: | 6.5 |
| Vector String: | AV:A/AC:H/Au:S/C:C/I:C/A:C |
| Version: | 2.0 |
| Attack Vector: | Adjacent Network |
| Attack Complexity: | High |
| Authentication: | Single |
| Confidentiality Impact: | Complete |
| Integrity Impact: | Complete |
| Availability Impact: | Complete |
| Platform | Errata | Release Date |
| Oracle Linux version 5 (xen) | ELSA-2016-2963 | 2016-12-20 |
| Oracle VM version 3.2 (xen) | OVMSA-2016-0172 | 2016-12-07 |
| Oracle VM version 3.3 (xen) | OVMSA-2016-0171 | 2016-12-07 |
| Oracle VM version 3.4 (xen) | OVMSA-2016-0173 | 2016-12-07 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: