[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-5513Date: (C)2012-12-13   (M)2023-12-22


The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.9
Exploit Score: 3.4
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-51397
SECUNIA-51468
SECUNIA-51486
SECUNIA-51487
SECUNIA-51495
SECUNIA-55082
BID-56797
OSVDB-88131
DSA-2582
GLSA-201309-24
RHSA-2012:1540
SUSE-SU-2012:1606
SUSE-SU-2012:1615
SUSE-SU-2014:0446
SUSE-SU-2014:0470
http://www.openwall.com/lists/oss-security/2012/12/03/11
http://support.citrix.com/article/CTX135777
openSUSE-SU-2012:1685
openSUSE-SU-2012:1687
openSUSE-SU-2013:0133
openSUSE-SU-2013:0636
openSUSE-SU-2013:0637
xen-xenmemexchange-priv-esc(80482)

CWE    1
CWE-20
OVAL    20
oval:org.secpod.oval:def:104392
oval:org.secpod.oval:def:600923
oval:org.secpod.oval:def:400458
oval:org.secpod.oval:def:202499
...

© SecPod Technologies