Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-3515

Опубликовано: 23 нояб. 2012
Источник: debian
EPSS Низкий

Описание

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.1.3-2package
xennot-affectedsqueezepackage
xen-qemu-dm-4.0removedpackage
qemufixed1.1.2+dfsg-1package
qemu-kvmfixed1.1.2+dfsg-1package

EPSS

Процентиль: 23%
0.00076
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

redhat
почти 13 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

nvd
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

github
больше 3 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

oracle-oval
почти 13 лет назад

ELSA-2012-1236: xen security update (IMPORTANT)

EPSS

Процентиль: 23%
0.00076
Низкий