Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-3495

Overview

Vulnerability Score 6.1 6.1
CVE Id CVE-2012-3495
Last Modified 05 May 2014 01:12:43
Published 23 Nov 2012 03:55:03
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2012-3495

Summary

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

Vulnerable Systems

Operating System

  • Xen 4.1.0

  • Xen 4.1.1

  • Xen 4.1.2

  • Xen 4.1.3

Application

  • Citrix Xenserver 5.0

  • Citrix Xenserver 5.5

  • Citrix Xenserver 5.6

  • Citrix Xenserver 6.0

  • Citrix Xenserver 6.0.2


References

CONFIRM - http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593

SECTRACK - 1027480

BID - 55406

MLIST - [oss-security] 20120905 Xen Security Advisory 13 (CVE-2012-3495) - hypercall physdev_get_free_pirq vulnerability

CONFIRM - http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability

CONFIRM - http://support.citrix.com/article/CTX134708

MLIST - [Xen-announce] 20120905 Xen Security Advisory 13 (CVE-2012-3495) - hypercall physdev_get_free_pirq vulnerability

SUSE - openSUSE-SU-2012:1172

SUSE - openSUSE-SU-2012:1572

SUSE - SUSE-SU-2012:1133

SUSE - SUSE-SU-2012:1132

SECUNIA - 51413

GENTOO - GLSA-201309-24

SECUNIA - 55082

SUSE - openSUSE-SU-2012:1573

Related Patches

Novell SUSE 2012:6748 xen-201209 security update for SLE 11 SP2 i586

Novell SUSE 2012:6748 xen-201209 security update for SLE 11 SP2 x86_64


Last Updated: 27 May 2016 10:57:37