CVE-2012-5513

EUVD-2012-5405
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
xenxen
𝑥
≤ 4.2.0
xenxen
3.0.2
xenxen
3.0.3
xenxen
3.0.4
xenxen
3.1.3
xenxen
3.1.4
xenxen
3.2.0
xenxen
3.2.1
xenxen
3.2.2
xenxen
3.2.3
xenxen
3.3.0
xenxen
3.3.1
xenxen
3.3.2
xenxen
3.4.0
xenxen
3.4.1
xenxen
3.4.2
xenxen
3.4.3
xenxen
3.4.4
xenxen
4.0.0
xenxen
4.0.1
xenxen
4.0.2
xenxen
4.0.3
xenxen
4.0.4
xenxen
4.1.0
xenxen
4.1.1
xenxen
4.1.2
xenxen
4.1.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
hardy
dne
lucid
dne
oneiric
Fixed 4.1.1-2ubuntu4.3
released
precise
Fixed 4.1.2-2ubuntu2.3
released
quantal
Fixed 4.1.3-3ubuntu1.1
released
raring
Fixed 4.2.0-1ubuntu4
released
saucy
Fixed 4.2.0-1ubuntu4
released
xen-3.1
hardy
ignored
lucid
dne
oneiric
dne
precise
dne
quantal
dne
raring
dne
saucy
dne
xen-3.2
hardy
ignored
lucid
dne
oneiric
dne
precise
dne
quantal
dne
raring
dne
saucy
dne
xen-3.3
hardy
dne
lucid
ignored
oneiric
dne
precise
dne
quantal
dne
raring
dne
saucy
dne
References