Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3495

Опубликовано: 23 нояб. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.1

Описание

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

natty

DNE

oneiric

released

4.1.1-2ubuntu4.4
precise

released

4.1.2-2ubuntu2.4
quantal

not-affected

4.1.3-3ubuntu1
upstream

released

4.1.3-2

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

natty

not-affected

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 24%
0.00081
Низкий

6.1 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

nvd
около 13 лет назад

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

debian
около 13 лет назад

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x ...

github
больше 3 лет назад

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

EPSS

Процентиль: 24%
0.00081
Низкий

6.1 Medium

CVSS2