CVE-2012-3515

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

References

http://git.qemu.org/?p=qemu-stable-0.15.git;a=log

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html

http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html

http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html

http://rhn.redhat.com/errata/RHSA-2012-1233.html

http://rhn.redhat.com/errata/RHSA-2012-1234.html

http://rhn.redhat.com/errata/RHSA-2012-1235.html

http://rhn.redhat.com/errata/RHSA-2012-1236.html

http://rhn.redhat.com/errata/RHSA-2012-1262.html

http://rhn.redhat.com/errata/RHSA-2012-1325.html

http://secunia.com/advisories/50472

http://secunia.com/advisories/50528

http://secunia.com/advisories/50530

http://secunia.com/advisories/50632

http://secunia.com/advisories/50689

http://secunia.com/advisories/50860

http://secunia.com/advisories/50913

http://secunia.com/advisories/51413

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://support.citrix.com/article/CTX134708

http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability

http://www.debian.org/security/2012/dsa-2543

http://www.debian.org/security/2012/dsa-2545

http://www.openwall.com/lists/oss-security/2012/09/05/10

http://www.securityfocus.com/bid/55413

http://www.ubuntu.com/usn/USN-1590-1

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2012-11-23

Updated: 2020-08-11

Type: CWE-20

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*

cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*

cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*

cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

Tenable Plugins

View all (42 total)

IDNameProductFamilySeverity
90380GLSA-201604-03 : Xen: Multiple vulnerabilities (Venom)NessusGentoo Local Security Checks
critical
87743F5 Networks BIG-IP : QEMU vulnerability (SOL13405416)NessusF5 Networks Local Security Checks
high
84140OracleVM 3.2 : xen (OVMSA-2015-0068) (POODLE) (Venom)NessusOracleVM Local Security Checks
low
79486OracleVM 2.2 : xen (OVMSA-2012-0048)NessusOracleVM Local Security Checks
high
79485OracleVM 3.1 : xen (OVMSA-2012-0046)NessusOracleVM Local Security Checks
high
79483OracleVM 3.0 : xen (OVMSA-2012-0040)NessusOracleVM Local Security Checks
high
79482OracleVM 3.1 : xen (OVMSA-2012-0039)NessusOracleVM Local Security Checks
high
78935RHEL 6 : rhev-hypervisor6 (RHSA-2012:1325)NessusRed Hat Local Security Checks
high
78933RHEL 5 : rhev-hypervisor5 (RHSA-2012:1262)NessusRed Hat Local Security Checks
high
78932RHEL 6 : qemu-kvm-rhev (RHSA-2012:1233)NessusRed Hat Local Security Checks
high
74821openSUSE Security Update : XEN (openSUSE-SU-2012:1573-1)NessusSuSE Local Security Checks
high
74820openSUSE Security Update : XEN (openSUSE-SU-2012:1572-1)NessusSuSE Local Security Checks
high
74752openSUSE Security Update : qemu (openSUSE-SU-2012:1170-1)NessusSuSE Local Security Checks
high
74751openSUSE Security Update : Xen (openSUSE-SU-2012:1176-1)NessusSuSE Local Security Checks
high
74750openSUSE Security Update : Xen (openSUSE-SU-2012:1172-1)NessusSuSE Local Security Checks
high
74749openSUSE Security Update : Xen (openSUSE-SU-2012:1174-1)NessusSuSE Local Security Checks
high
74747openSUSE Security Update : kvm (openSUSE-SU-2012:1153-1)NessusSuSE Local Security Checks
high
70184GLSA-201309-24 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
68614Oracle Linux 5 : xen (ELSA-2012-1236)NessusOracle Linux Local Security Checks
high
68613Oracle Linux 5 : kvm (ELSA-2012-1235)NessusOracle Linux Local Security Checks
high
68612Oracle Linux 6 : qemu-kvm (ELSA-2012-1234)NessusOracle Linux Local Security Checks
high
66133Mandriva Linux Security Advisory : qemu (MDVSA-2013:121)NessusMandriva Local Security Checks
high
64237SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
64236SuSE 11.2 Security Update : Xen (SAT Patch Number 6748)NessusSuSE Local Security Checks
high
64181SuSE 11.2 Security Update : kvm (SAT Patch Number 6755)NessusSuSE Local Security Checks
high
64055RHEL 5 : kvm (RHSA-2012:1235)NessusRed Hat Local Security Checks
high
64054RHEL 6 : qemu-kvm (RHSA-2012:1234)NessusRed Hat Local Security Checks
high
62568Fedora 16 : qemu-0.15.1-8.fc16 (2012-15606)NessusFedora Local Security Checks
high
62535Fedora 17 : qemu-1.0.1-2.fc17 (2012-15740)NessusFedora Local Security Checks
high
62408Ubuntu 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : qemu-kvm vulnerability (USN-1590-1)NessusUbuntu Local Security Checks
high
62155Fedora 16 : xen-4.1.3-2.fc16 (2012-13443)NessusFedora Local Security Checks
high
62025SuSE 10 Security Update : Xen (ZYPP Patch Number 8268)NessusSuSE Local Security Checks
high
62016Debian DSA-2545-1 : qemu - multiple vulnerabilitiesNessusDebian Local Security Checks
high
62014Debian DSA-2543-1 : xen-qemu-dm-4.0 - multiple vulnerabilitiesNessusDebian Local Security Checks
high
62013Debian DSA-2542-1 : qemu-kvm - multiple vulnerabilitiesNessusDebian Local Security Checks
high
61999CentOS 6 : qemu-kvm (CESA-2012:1234)NessusCentOS Local Security Checks
high
61796Scientific Linux Security Update : xen on SL5.x i386/x86_64 (20120905)NessusScientific Linux Local Security Checks
high
61795Scientific Linux Security Update : qemu-kvm on SL6.x x86_64 (20120905)NessusScientific Linux Local Security Checks
high
61794Scientific Linux Security Update : kvm on SL5.x x86_64 (20120905)NessusScientific Linux Local Security Checks
high
61793RHEL 5 : xen (RHSA-2012:1236)NessusRed Hat Local Security Checks
high
61791CentOS 5 : xen (CESA-2012:1236)NessusCentOS Local Security Checks
high
61790CentOS 5 : kvm (CESA-2012:1235)NessusCentOS Local Security Checks
high