{"id":"CVE-2016-9383","details":"Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.","modified":"2026-04-16T01:38:46.848056033Z","published":"2017-01-23T21:59:02.860Z","related":["SUSE-SU-2016:3044-1","SUSE-SU-2016:3067-1","SUSE-SU-2016:3083-1","SUSE-SU-2016:3156-1","SUSE-SU-2016:3174-1","SUSE-SU-2016:3273-1","openSUSE-SU-2024:11520-1"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94474"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037346"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-56"},{"type":"FIX","url":"http://xenbits.xen.org/xsa/advisory-195.html"},{"type":"FIX","url":"https://support.citrix.com/article/CTX218775"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9383.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}