Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2016-6259

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.9%
CVSS Severity
CVSS v3 Score 6.2
CVSS v2 Score 4.9
Products affected by CVE-2016-6259
  • Citrix » Xenserver » Version: 6.0
    cpe:2.3:a:citrix:xenserver:6.0
  • Citrix » Xenserver » Version: 6.0.2
    cpe:2.3:a:citrix:xenserver:6.0.2
  • Citrix » Xenserver » Version: 6.1
    cpe:2.3:a:citrix:xenserver:6.1
  • Citrix » Xenserver » Version: 6.2.0
    cpe:2.3:a:citrix:xenserver:6.2.0
  • Citrix » Xenserver » Version: 6.5.0
    cpe:2.3:a:citrix:xenserver:6.5.0
  • Citrix » Xenserver » Version: 7.0
    cpe:2.3:a:citrix:xenserver:7.0
  • Xen » Xen » Version: 4.5.0
    cpe:2.3:o:xen:xen:4.5.0
  • Xen » Xen » Version: 4.5.1
    cpe:2.3:o:xen:xen:4.5.1
  • Xen » Xen » Version: 4.5.2
    cpe:2.3:o:xen:xen:4.5.2
  • Xen » Xen » Version: 4.5.3
    cpe:2.3:o:xen:xen:4.5.3
  • Xen » Xen » Version: 4.6.0
    cpe:2.3:o:xen:xen:4.6.0
  • Xen » Xen » Version: 4.6.1
    cpe:2.3:o:xen:xen:4.6.1
  • Xen » Xen » Version: 4.6.3
    cpe:2.3:o:xen:xen:4.6.3
  • Xen » Xen » Version: 4.7.0
    cpe:2.3:o:xen:xen:4.7.0


Contact Us

Shodan ® - All rights reserved