CVE-2012-5511

Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
http://secunia.com/advisories/51397 Vendor Advisory
http://secunia.com/advisories/51486 Vendor Advisory
http://secunia.com/advisories/51487 Vendor Advisory
http://secunia.com/advisories/55082
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://support.citrix.com/article/CTX135777
http://www.debian.org/security/2013/dsa-2636
http://www.openwall.com/lists/oss-security/2012/12/03/10
http://www.osvdb.org/88129
http://www.securityfocus.com/bid/56796
https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
http://secunia.com/advisories/51397 Vendor Advisory
http://secunia.com/advisories/51486 Vendor Advisory
http://secunia.com/advisories/51487 Vendor Advisory
http://secunia.com/advisories/55082
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://support.citrix.com/article/CTX135777
http://www.debian.org/security/2013/dsa-2636
http://www.openwall.com/lists/oss-security/2012/12/03/10
http://www.osvdb.org/88129
http://www.securityfocus.com/bid/56796
https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html - () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html -
References () http://secunia.com/advisories/51397 - Vendor Advisory () http://secunia.com/advisories/51397 - Vendor Advisory
References () http://secunia.com/advisories/51486 - Vendor Advisory () http://secunia.com/advisories/51486 - Vendor Advisory
References () http://secunia.com/advisories/51487 - Vendor Advisory () http://secunia.com/advisories/51487 - Vendor Advisory
References () http://secunia.com/advisories/55082 - () http://secunia.com/advisories/55082 -
References () http://security.gentoo.org/glsa/glsa-201309-24.xml - () http://security.gentoo.org/glsa/glsa-201309-24.xml -
References () http://support.citrix.com/article/CTX135777 - () http://support.citrix.com/article/CTX135777 -
References () http://www.debian.org/security/2013/dsa-2636 - () http://www.debian.org/security/2013/dsa-2636 -
References () http://www.openwall.com/lists/oss-security/2012/12/03/10 - () http://www.openwall.com/lists/oss-security/2012/12/03/10 -
References () http://www.osvdb.org/88129 - () http://www.osvdb.org/88129 -
References () http://www.securityfocus.com/bid/56796 - () http://www.securityfocus.com/bid/56796 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80484 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80484 -

Information

Published : 2012-12-13 11:53

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5511

Mitre link : CVE-2012-5511

CVE.ORG link : CVE-2012-5511


JSON object : View

Products Affected

xen

  • xen
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer