{
  "threat_severity" : "Moderate",
  "public_date" : "2016-11-22T00:00:00Z",
  "bugzilla" : {
    "description" : "xen: x86 null segments not always treated as unusable (XSA-191)",
    "id" : "1392932",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1392932"
  },
  "cvss" : {
    "cvss_base_score" : "6.0",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:S/C:P/I:P/A:P",
    "status" : "draft"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "details" : [ "The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving \"unexpected\" base/limit values." ],
  "acknowledgement" : "Red Hat would like to thank the Xen project for reporting this issue. Upstream acknowledges Andrew Cooper (Citrix) as the original reporter.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-9386\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-9386\nhttp://xenbits.xen.org/xsa/advisory-191.html" ],
  "name" : "CVE-2016-9386",
  "csaw" : false
}