CVE-2012-3515
23.11.2012, 20:55
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."Enginsight
| Vendor | Product | Version |
|---|---|---|
| qemu | qemu | 𝑥 < 1.2.0 |
| xen | xen | 4.0.0 |
| xen | xen | 4.1.0 |
| opensuse | opensuse | 11.4 |
| opensuse | opensuse | 12.1 |
| opensuse | opensuse | 12.2 |
| redhat | virtualization | 3.0 |
| redhat | virtualization | 5.0 |
| redhat | virtualization | 6.0 |
| redhat | enterprise_linux_desktop | 5.0 |
| redhat | enterprise_linux_desktop | 6.0 |
| redhat | enterprise_linux_eus | 6.3 |
| redhat | enterprise_linux_server | 5.0 |
| redhat | enterprise_linux_server | 6.0 |
| redhat | enterprise_linux_workstation | 5.0 |
| redhat | enterprise_linux_workstation | 6.0 |
| debian | debian_linux | 6.0 |
| debian | debian_linux | 7.0 |
| canonical | ubuntu_linux | 10.04 |
| canonical | ubuntu_linux | 11.04 |
| canonical | ubuntu_linux | 11.10 |
| canonical | ubuntu_linux | 12.04 |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| qemu |
| ||||||||||||
| xen |
|
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| qemu-kvm |
| ||||||||||||||||
| xen |
| ||||||||||||||||
| xen-3.1 |
| ||||||||||||||||
| xen-3.2 |
| ||||||||||||||||
| xen-3.3 |
| ||||||||||||||||
| xen-qemu-dm-4.0 |
|
Common Weakness Enumeration
References