[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-6033Date: (C)2012-11-25   (M)2023-12-22


The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.4
Exploit Score: 3.4
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1027482
SECUNIA-50472
SECUNIA-55082
BID-55410
OSVDB-85199
GLSA-201309-24
GLSA-201604-03
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
http://www.openwall.com/lists/oss-security/2012/09/05/8
http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
xen-tmem-priv-esc(78268)

CPE    3
cpe:/o:xen:xen:4.2.0
cpe:/o:xen:xen:4.1.0
cpe:/o:xen:xen:4.0.0
CWE    1
CWE-264

© SecPod Technologies