Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2012-6033

Опубликовано: 23 нояб. 2012
Источник: nvd
CVSS2: 4.4
EPSS Низкий

Описание

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*

EPSS

Процентиль: 22%
0.0007
Низкий

4.4 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
около 13 лет назад

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

debian
около 13 лет назад

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen ...

github
больше 3 лет назад

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

EPSS

Процентиль: 22%
0.0007
Низкий

4.4 Medium

CVSS2

Дефекты

CWE-264