CVE-2012-3494

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.

References

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html

http://osvdb.org/85197

http://secunia.com/advisories/50472

http://secunia.com/advisories/50530

http://secunia.com/advisories/51413

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://support.citrix.com/article/CTX134708

http://wiki.xen.org/wiki/Security_Announcements#XSA-12_hypercall_set_debugreg_vulnerability

http://www.debian.org/security/2012/dsa-2544

http://www.openwall.com/lists/oss-security/2012/09/05/5

http://www.securityfocus.com/bid/55400

http://www.securitytracker.com/id?1027479

https://bugzilla.redhat.com/show_bug.cgi?id=851139

https://exchange.xforce.ibmcloud.com/vulnerabilities/78265

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2012-11-23

Updated: 2017-08-29

Type: CWE-264

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
79486OracleVM 2.2 : xen (OVMSA-2012-0048)NessusOracleVM Local Security Checks
high
79483OracleVM 3.0 : xen (OVMSA-2012-0040)NessusOracleVM Local Security Checks
high
79482OracleVM 3.1 : xen (OVMSA-2012-0039)NessusOracleVM Local Security Checks
high
74821openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)NessusSuSE Local Security Checks
high
74820openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)NessusSuSE Local Security Checks
high
74751openSUSE Security Update : Xen (openSUSE-SU-2012:1176-1)NessusSuSE Local Security Checks
high
74750openSUSE Security Update : Xen (openSUSE-SU-2012:1172-1)NessusSuSE Local Security Checks
high
74749openSUSE Security Update : Xen (openSUSE-SU-2012:1174-1)NessusSuSE Local Security Checks
high
70184GLSA-201309-24 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
64237SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
64236SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
62155Fedora 16 : xen-4.1.3-2.fc16 (2012-13443)NessusFedora Local Security Checks
high
62025SuSE 10 Security Update : Xen (ZYPP Patch Number 8268)NessusSuSE Local Security Checks
high
62015Debian DSA-2544-1 : xen - denial of serviceNessusDebian Local Security Checks
medium