High severity8.2NVD Advisory· Published Sep 21, 2016· Updated May 6, 2026
CVE-2016-7093
CVE-2016-7093
Description
Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- xenbits.xen.org/xsa/advisory-186.htmlnvdPatchVendor Advisory
- xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patchnvdPatchVendor Advisory
- support.citrix.com/article/CTX216071nvdThird Party Advisory
- www.securitytracker.com/id/1036752nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/92865nvd
- security.gentoo.org/glsa/201611-09nvd
News mentions
0No linked articles in our index yet.