Files
CVEs-PoC/2017/CVE-2017-7228.md
T
2024-06-18 02:51:15 +02:00

18 lines
772 B
Markdown

### [CVE-2017-7228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7228)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.
### POC
#### Reference
- https://www.exploit-db.com/exploits/41870/
#### Github
- https://github.com/jhembree/IACapstone