CVE-2012-3515
23.11.2012, 20:55
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."Enginsight
Vendor | Product | Version |
---|---|---|
qemu | qemu | 𝑥 < 1.2.0 |
xen | xen | 4.0.0 |
xen | xen | 4.1.0 |
opensuse | opensuse | 11.4 |
opensuse | opensuse | 12.1 |
opensuse | opensuse | 12.2 |
redhat | virtualization | 3.0 |
redhat | virtualization | 5.0 |
redhat | virtualization | 6.0 |
redhat | enterprise_linux_desktop | 5.0 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_eus | 6.3 |
redhat | enterprise_linux_server | 5.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_workstation | 5.0 |
redhat | enterprise_linux_workstation | 6.0 |
debian | debian_linux | 6.0 |
debian | debian_linux | 7.0 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 11.04 |
canonical | ubuntu_linux | 11.10 |
canonical | ubuntu_linux | 12.04 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qemu |
| ||||||||||||
xen |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
qemu-kvm |
| ||||||||||||||||
xen |
| ||||||||||||||||
xen-3.1 |
| ||||||||||||||||
xen-3.2 |
| ||||||||||||||||
xen-3.3 |
| ||||||||||||||||
xen-qemu-dm-4.0 |
|
Common Weakness Enumeration
References