CVE-2012-3497

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.

References

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html

http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html

http://osvdb.org/85199

http://secunia.com/advisories/50472

http://secunia.com/advisories/51324

http://secunia.com/advisories/51352

http://secunia.com/advisories/51413

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities

http://www.openwall.com/lists/oss-security/2012/09/05/8

http://www.securityfocus.com/bid/55410

http://www.securitytracker.com/id?1027482

https://exchange.xforce.ibmcloud.com/vulnerabilities/78268

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2012-11-23

Updated: 2017-08-29

Type: CWE-20

Risk Information

CVSS v2

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

Tenable Plugins

View all (10 total)

IDNameProductFamilySeverity
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
83616SUSE SLES11 Security Update : Xen (SUSE-SU-2014:0446-1)NessusSuSE Local Security Checks
high
83564SUSE SLED10 / SLES10 Security Update : Xen (SUSE-SU-2012:1487-1)NessusSuSE Local Security Checks
medium
74821openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)NessusSuSE Local Security Checks
high
74820openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)NessusSuSE Local Security Checks
high
70184GLSA-201309-24 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
64238SuSE 11.2 Security Update : Xen (SAT Patch Number 7018)NessusSuSE Local Security Checks
medium
64201SuSE 11.2 Security Update : libvirt (SAT Patch Number 7015)NessusSuSE Local Security Checks
medium
62963SuSE 10 Security Update : Xen (ZYPP Patch Number 8359)NessusSuSE Local Security Checks
medium