High severity8.8NVD Advisory· Published Jan 23, 2017· Updated May 13, 2026
CVE-2016-9383
CVE-2016-9383
Description
Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
Affected products
5cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- xenbits.xen.org/xsa/advisory-195.htmlnvdPatchVendor Advisory
- support.citrix.com/article/CTX218775nvdPatchThird Party Advisory
- www.securityfocus.com/bid/94474nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037346nvdThird Party AdvisoryVDB Entry
- security.gentoo.org/glsa/201612-56nvd
News mentions
0No linked articles in our index yet.