Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3515

Опубликовано: 23 нояб. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

released

0.12.3+noroms-0ubuntu9.20
natty

released

0.14.0+noroms-0ubuntu4.7
oneiric

released

0.14.1+noroms-0ubuntu6.5
precise

released

1.0+noroms-0ubuntu14.2
quantal

not-affected

1.2.0+noroms-0ubuntu2
raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

hardy

DNE

lucid

DNE

natty

DNE

oneiric

released

4.1.1-2ubuntu4.4
precise

released

4.1.2-2ubuntu2.4
quantal

not-affected

4.1.3-3ubuntu1
raring

not-affected

saucy

not-affected

upstream

released

4.1.3-2

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

DNE

natty

ignored

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 17%
0.00056
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

nvd
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

debian
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ...

github
больше 3 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

oracle-oval
почти 13 лет назад

ELSA-2012-1236: xen security update (IMPORTANT)

EPSS

Процентиль: 17%
0.00056
Низкий

7.2 High

CVSS2