CVE-2012-3515

high

Description

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

References

http://git.qemu.org/?p=qemu-stable-0.15.git;a=log

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html

http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html

http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html

http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html

http://rhn.redhat.com/errata/RHSA-2012-1233.html

http://rhn.redhat.com/errata/RHSA-2012-1234.html

http://rhn.redhat.com/errata/RHSA-2012-1235.html

http://rhn.redhat.com/errata/RHSA-2012-1236.html

http://rhn.redhat.com/errata/RHSA-2012-1262.html

http://rhn.redhat.com/errata/RHSA-2012-1325.html

http://secunia.com/advisories/50472

http://secunia.com/advisories/50528

http://secunia.com/advisories/50530

http://secunia.com/advisories/50632

http://secunia.com/advisories/50689

http://secunia.com/advisories/50860

http://secunia.com/advisories/50913

http://secunia.com/advisories/51413

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://support.citrix.com/article/CTX134708

http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability

http://www.debian.org/security/2012/dsa-2543

http://www.debian.org/security/2012/dsa-2545

http://www.openwall.com/lists/oss-security/2012/09/05/10

http://www.securityfocus.com/bid/55413

http://www.ubuntu.com/usn/USN-1590-1

https://security.gentoo.org/glsa/201604-03

Details

Source: MITRE

Published: 2012-11-23

Updated: 2020-08-11

Type: CWE-20

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH