Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-0217

Overview

Vulnerability Score 7.2 7.2
CVE Id CVE-2012-0217
Last Modified 10 Oct 2013 11:40:30
Published 12 Jun 2012 06:55:01
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2012-0217

Summary

The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.

Vulnerable Systems

Operating System

  • Freebsd 9.0

  • Illumos R13723

  • Joyent Smartos 20120614

  • Microsoft Windows 7

  • Microsoft Windows Server 2003

  • Microsoft Windows Server 2008 R2

  • Microsoft Windows Xp

  • Netbsd 6.0

  • Sunos 5.11

  • Xen 4.0.0

  • Xen 4.0.1

  • Xen 4.0.2

  • Xen 4.0.3

  • Xen 4.0.4

  • Xen 4.1.0

  • Xen 4.1.1

  • Xen 4.1.2

Application

  • Citrix Xenserver 6.0

  • Citrix Xenserver 6.0.2


References

MS - MS12-042

CERT-VN - VU#649219

CONFIRM - https://www.illumos.org/issues/2873

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=813428

CONFIRM - http://wiki.smartos.org/display/DOC/SmartOS+Change+Log#SmartOSChangeLog-June14%2C2012

CONFIRM - http://support.citrix.com/article/CTX133161

CONFIRM - http://smartos.org/2012/06/15/smartos-news-3/

FREEBSD - FreeBSD-SA-12:04

MLIST - [xen-devel] 20120619 Security vulnerability process, and CVE-2012-0217

MLIST - [xen-announce] 20120612 Xen Security Advisory 7 (CVE-2012-0217) - PV privilege escalation

NETBSD - NetBSD-SA2012-003

CONFIRM - http://blog.xen.org/index.php/2012/06/13/the-intel-sysret-privilege-escalation/

CONFIRM - http://blog.illumos.org/2012/06/14/illumos-vulnerability-patched/

DEBIAN - DSA-2508

CONFIRM - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html

DEBIAN - DSA-2501

CERT - TA12-164A

MANDRIVA - MDVSA-2013:150

GENTOO - GLSA-201309-24

SECUNIA - 55082

Related Patches

SUN147441-22 Solaris 10 x86: Solaris kernel patch (Rev 2)

MS12-042 Security Update for Windows Server 2003 (KB2707511)

MS12-042 Security Update for Windows XP (KB2707511)

MS12-042 2711167 2709715 Security Update for Windows 7 and Windows Server 2008 R2 (All Languages)

MS12-042 Security Update for Windows Server 2008 R2 x64 (KB2709715)

Red Hat 2012:0721-01 RHSA Important: kernel security update for RHEL 5 x86

Red Hat 2012:0721-01 RHSA Important: kernel security update for RHEL 5 x86_64

Novell SUSE 2012:6399 xen-201206 security update for SLE 11 SP1 i586

Novell SUSE 2012:6399 xen-201206 security update for SLE 11 SP1 x86_64

Novell SUSE 2012:6400 xen-201206 recommended update for SLE 11 SP2 i586

Novell SUSE 2012:6400 xen-201206 recommended update for SLE 11 SP2 x86_64

Novell SUSE 2012:8180 xen-201206 security update for SLE 10 SP4 i586

Novell SUSE 2012:8180 xen-201206 security update for SLE 10 SP4 x86_64


Last Updated: 27 May 2016 11:03:09