4.7
CVSSv2

CVE-2012-5515

Published: 13/12/2012 Updated: 29/08/2017
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 418
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and previous versions allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

xen xen 4.1.2

xen xen 4.0.4

xen xen 3.4.1

xen xen 3.4.2

xen xen 3.2.0

xen xen 3.1.4

xen xen 4.1.0

xen xen 4.1.3

xen xen 3.4.3

xen xen 3.4.4

xen xen 3.2.2

xen xen 3.2.1

xen xen 4.0.3

xen xen 4.0.2

xen xen 3.4.0

xen xen 3.3.0

xen xen 3.1.3

xen xen 3.0.4

xen xen

xen xen 4.1.1

xen xen 4.0.1

xen xen 4.0.0

xen xen 3.3.1

xen xen 3.3.2

xen xen 3.2.3

xen xen 3.0.3

xen xen 3.0.2

Vendor Advisories

Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix three security issues and several bugs arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity im ...
Multiple denial of service vulnerabilities have been discovered in the Xen Hypervisor One of the issue (CVE-2012-5513) could even lead to privilege escalation from guest to host Some of the recently published Xen Security Advisories (XSA 25 and 28) are not fixed by this update and should be fixed in a future release CVE-2011-3131 (XSA 5): DoS ...