The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability announce CVE-2017-8905

Xen: memory corruption via the fallback exception handler

Synthesis of the vulnerability

An attacker, inside a guest system, can generate a memory corruption via the exception handler of Xen, in order to trigger a denial of service, and possibly to run code on the host system.
Impacted products: XenServer, Fedora, Xen.
Severity: 1/4.
Creation date: 02/05/2017.
Identifiers: CERTFR-2017-AVI-137, CTX223291, CVE-2017-8905, FEDORA-2017-c9d71f0860, VIGILANCE-VUL-22627, XSA-215.

Description of the vulnerability

The Xen product offers a fallback exception handling mechanism.

However, when returning to the guest user process, the stack cleanup is wrong.

An attacker, inside a guest system, can therefore generate a memory corruption via the exception handler of Xen, in order to trigger a denial of service, and possibly to run code on the host system.
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerability note. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.