Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5513

Опубликовано: 13 дек. 2012
Источник: debian
EPSS Низкий

Описание

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.1.3-5package

EPSS

Процентиль: 35%
0.00143
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

redhat
больше 12 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

nvd
больше 12 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

github
около 3 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

oracle-oval
больше 12 лет назад

ELSA-2012-1540: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 35%
0.00143
Низкий