{"id":"CVE-2016-7093","details":"Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.","modified":"2026-04-16T06:22:04.633118092Z","published":"2016-09-21T14:25:24.097Z","related":["SUSE-SU-2016:2473-1","SUSE-SU-2016:2507-1","SUSE-SU-2016:2533-1","openSUSE-SU-2024:10196-1"],"references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/92865"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201611-09"},{"type":"ADVISORY","url":"http://support.citrix.com/article/CTX216071"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036752"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/xsa186-0001-x86-emulate-Correct-boundary-interactions-of-emulate.patch"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-186.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.5.3"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6.3"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7093.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}