Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
xen xen 4.0.0 |
||
xen xen 4.1.0 |
||
qemu qemu |
||
suse linux enterprise server 11 |
||
suse linux enterprise server 10 |
||
suse linux enterprise desktop 11 |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.2 |
||
suse linux enterprise desktop 10 |
||
opensuse opensuse 12.1 |
||
suse linux enterprise software development kit 11 |
||
suse linux enterprise software development kit 10 |
||
redhat virtualization 3.0 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux eus 6.3 |
||
redhat virtualization 6.0 |
||
redhat virtualization 5.0 |
||
debian debian linux 7.0 |
||
debian debian linux 6.0 |
||
canonical ubuntu linux 11.04 |
||
canonical ubuntu linux 11.10 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 10.04 |