Lucene search

K
cve[email protected]CVE-2012-5513
HistoryDec 13, 2012 - 11:53 a.m.

CVE-2012-5513

2012-12-1311:53:48
CWE-20
web.nvd.nist.gov
58
xenmem_exchange
xen 4.2
memory address
denial of service
privilege escalation
nvd
cve-2012-5513

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

Affected configurations

NVD
Node
xenxenRange≀4.2.0
OR
xenxenMatch3.0.2
OR
xenxenMatch3.0.3
OR
xenxenMatch3.0.4
OR
xenxenMatch3.1.3
OR
xenxenMatch3.1.4
OR
xenxenMatch3.2.0
OR
xenxenMatch3.2.1
OR
xenxenMatch3.2.2
OR
xenxenMatch3.2.3
OR
xenxenMatch3.3.0
OR
xenxenMatch3.3.1
OR
xenxenMatch3.3.2
OR
xenxenMatch3.4.0
OR
xenxenMatch3.4.1
OR
xenxenMatch3.4.2
OR
xenxenMatch3.4.3
OR
xenxenMatch3.4.4
OR
xenxenMatch4.0.0
OR
xenxenMatch4.0.1
OR
xenxenMatch4.0.2
OR
xenxenMatch4.0.3
OR
xenxenMatch4.0.4
OR
xenxenMatch4.1.0
OR
xenxenMatch4.1.1
OR
xenxenMatch4.1.2
OR
xenxenMatch4.1.3

References

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%