6.9
CVSSv2

CVE-2012-5513

Published: 13/12/2012 Updated: 13/02/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The XENMEM_exchange handler in Xen 4.2 and previous versions does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 3.2.0

xen xen 3.2.1

xen xen 3.0.4

xen xen 3.4.0

xen xen 4.0.4

xen xen 4.0.2

xen xen 3.3.2

xen xen 4.1.2

xen xen 3.2.2

xen xen 3.4.4

xen xen 4.0.0

xen xen 4.1.1

xen xen 4.1.0

xen xen 3.4.3

xen xen 3.0.3

xen xen 4.1.3

xen xen 3.2.3

xen xen

xen xen 3.3.1

xen xen 3.0.2

xen xen 3.4.2

xen xen 3.4.1

xen xen 3.1.4

xen xen 3.3.0

xen xen 3.1.3

xen xen 4.0.1

xen xen 4.0.3

Vendor Advisories

Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues, two bugs, andadd two enhancements are now available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated thi ...
Multiple denial of service vulnerabilities have been discovered in the Xen Hypervisor One of the issue (CVE-2012-5513) could even lead to privilege escalation from guest to host Some of the recently published Xen Security Advisories (XSA 25 and 28) are not fixed by this update and should be fixed in a future release CVE-2011-3131 (XSA 5): DoS ...