CVE-2012-3495

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-11-23 20:55

Updated : 2024-02-28 12:00


NVD link : CVE-2012-3495

Mitre link : CVE-2012-3495

CVE.ORG link : CVE-2012-3495


JSON object : View

Products Affected

citrix

  • xenserver

xen

  • xen
CWE
CWE-20

Improper Input Validation