1.9
CVSSv2

CVE-2012-2934

Published: 03/12/2012 Updated: 05/05/2014
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonical boundary, a different vulnerability than CVE-2012-0217.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.0.0

xen xen 4.1.0

Vendor Advisories

Synopsis Low: kernel security and bug fix update Type/Severity Security Advisory: Low Topic Updated kernel packages that fix one security issue and several bugs arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having lowsecurity impact A Common Vul ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix two security issues are now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerability S ...
Several vulnerabilities were discovered in Xen, a hypervisor CVE-2012-0217 Xen does not properly handle uncanonical return addresses on Intel amd64 CPUs, allowing amd64 PV guests to elevate to hypervisor privileges AMD processors, HVM and i386 guests are not affected CVE-2012-0218 Xen does not properly handle SYSCALL and SYSENTER instructi ...