CVE-2012-3496

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.

References

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html

http://secunia.com/advisories/50472

http://secunia.com/advisories/50530

http://secunia.com/advisories/51413

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://securitytracker.com/id?1027481

http://support.citrix.com/article/CTX134708

http://wiki.xen.org/wiki/Security_Announcements#XSA-14_XENMEM_populate_physmap_DoS_vulnerability

http://www.debian.org/security/2012/dsa-2544

http://www.openwall.com/lists/oss-security/2012/09/05/7

http://www.osvdb.org/85200

http://www.securityfocus.com/bid/55412

https://bugzilla.redhat.com/show_bug.cgi?id=854590

https://exchange.xforce.ibmcloud.com/vulnerabilities/78267

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2012-11-23

Updated: 2017-08-29

Type: CWE-16

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.4

Severity: MEDIUM

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
79486OracleVM 2.2 : xen (OVMSA-2012-0048)NessusOracleVM Local Security Checks
high
79482OracleVM 3.1 : xen (OVMSA-2012-0039)NessusOracleVM Local Security Checks
high
74821openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)NessusSuSE Local Security Checks
high
74820openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)NessusSuSE Local Security Checks
high
74751openSUSE Security Update : Xen (openSUSE-SU-2012:1176-1)NessusSuSE Local Security Checks
high
74750openSUSE Security Update : Xen (openSUSE-SU-2012:1172-1)NessusSuSE Local Security Checks
high
74749openSUSE Security Update : Xen (openSUSE-SU-2012:1174-1)NessusSuSE Local Security Checks
high
70184GLSA-201309-24 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
64237SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
64236SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
62155Fedora 16 : xen-4.1.3-2.fc16 (2012-13443)NessusFedora Local Security Checks
high
62015Debian DSA-2544-1 : xen - denial of serviceNessusDebian Local Security Checks
medium