CVE-2012-3495

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

References

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html

http://secunia.com/advisories/51413

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://support.citrix.com/article/CTX134708

http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability

http://www.openwall.com/lists/oss-security/2012/09/05/6

http://www.securityfocus.com/bid/55406

http://www.securitytracker.com/id?1027480

http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2012-11-23

Updated: 2017-07-01

Type: CWE-20

Risk Information

CVSS v2

Base Score: 6.1

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:C

Impact Score: 8.5

Exploitability Score: 3.9

Severity: MEDIUM

Tenable Plugins

View all (11 total)

IDNameProductFamilySeverity
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
79482OracleVM 3.1 : xen (OVMSA-2012-0039)NessusOracleVM Local Security Checks
high
74821openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)NessusSuSE Local Security Checks
high
74820openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)NessusSuSE Local Security Checks
high
74751openSUSE Security Update : Xen (openSUSE-SU-2012:1176-1)NessusSuSE Local Security Checks
high
74750openSUSE Security Update : Xen (openSUSE-SU-2012:1172-1)NessusSuSE Local Security Checks
high
70184GLSA-201309-24 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
64237SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
64236SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
62155Fedora 16 : xen-4.1.3-2.fc16 (2012-13443)NessusFedora Local Security Checks
high