CVE-2012-3495

EUVD-2012-3451
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.1 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
Affected Products (NVD)
VendorProductVersion
citrixxenserver
𝑥
≤ 6.0.2
citrixxenserver
5.0
citrixxenserver
5.5
citrixxenserver
5.6
citrixxenserver
5.6:fp1
citrixxenserver
5.6:sp2
citrixxenserver
6.0
xenxen
4.1.0
xenxen
4.1.1
xenxen
4.1.2
xenxen
4.1.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
squeeze
not-affected
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
hardy
dne
lucid
dne
natty
dne
oneiric
Fixed 4.1.1-2ubuntu4.4
released
precise
Fixed 4.1.2-2ubuntu2.4
released
quantal
not-affected
xen-3.1
hardy
not-affected
lucid
dne
natty
dne
oneiric
dne
precise
dne
quantal
dne
xen-3.2
hardy
not-affected
lucid
dne
natty
dne
oneiric
dne
precise
dne
quantal
dne
xen-3.3
hardy
dne
lucid
not-affected
natty
not-affected
oneiric
dne
precise
dne
quantal
dne
References