CVE-2012-5513

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
http://rhn.redhat.com/errata/RHSA-2012-1540.html
http://secunia.com/advisories/51397 Vendor Advisory
http://secunia.com/advisories/51468 Vendor Advisory
http://secunia.com/advisories/51486 Vendor Advisory
http://secunia.com/advisories/51487 Vendor Advisory
http://secunia.com/advisories/51495 Vendor Advisory
http://secunia.com/advisories/55082
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://support.citrix.com/article/CTX135777
http://www.debian.org/security/2012/dsa-2582
http://www.openwall.com/lists/oss-security/2012/12/03/11
http://www.osvdb.org/88131
http://www.securityfocus.com/bid/56797
https://exchange.xforce.ibmcloud.com/vulnerabilities/80482
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
http://rhn.redhat.com/errata/RHSA-2012-1540.html
http://secunia.com/advisories/51397 Vendor Advisory
http://secunia.com/advisories/51468 Vendor Advisory
http://secunia.com/advisories/51486 Vendor Advisory
http://secunia.com/advisories/51487 Vendor Advisory
http://secunia.com/advisories/51495 Vendor Advisory
http://secunia.com/advisories/55082
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://support.citrix.com/article/CTX135777
http://www.debian.org/security/2012/dsa-2582
http://www.openwall.com/lists/oss-security/2012/12/03/11
http://www.osvdb.org/88131
http://www.securityfocus.com/bid/56797
https://exchange.xforce.ibmcloud.com/vulnerabilities/80482
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html -
References () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html - () http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html -
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html - () http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1540.html - () http://rhn.redhat.com/errata/RHSA-2012-1540.html -
References () http://secunia.com/advisories/51397 - Vendor Advisory () http://secunia.com/advisories/51397 - Vendor Advisory
References () http://secunia.com/advisories/51468 - Vendor Advisory () http://secunia.com/advisories/51468 - Vendor Advisory
References () http://secunia.com/advisories/51486 - Vendor Advisory () http://secunia.com/advisories/51486 - Vendor Advisory
References () http://secunia.com/advisories/51487 - Vendor Advisory () http://secunia.com/advisories/51487 - Vendor Advisory
References () http://secunia.com/advisories/51495 - Vendor Advisory () http://secunia.com/advisories/51495 - Vendor Advisory
References () http://secunia.com/advisories/55082 - () http://secunia.com/advisories/55082 -
References () http://security.gentoo.org/glsa/glsa-201309-24.xml - () http://security.gentoo.org/glsa/glsa-201309-24.xml -
References () http://support.citrix.com/article/CTX135777 - () http://support.citrix.com/article/CTX135777 -
References () http://www.debian.org/security/2012/dsa-2582 - () http://www.debian.org/security/2012/dsa-2582 -
References () http://www.openwall.com/lists/oss-security/2012/12/03/11 - () http://www.openwall.com/lists/oss-security/2012/12/03/11 -
References () http://www.osvdb.org/88131 - () http://www.osvdb.org/88131 -
References () http://www.securityfocus.com/bid/56797 - () http://www.securityfocus.com/bid/56797 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/80482 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/80482 -

Information

Published : 2012-12-13 11:53

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5513

Mitre link : CVE-2012-5513

CVE.ORG link : CVE-2012-5513


JSON object : View

Products Affected

xen

  • xen
CWE
CWE-20

Improper Input Validation