Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-5513

Опубликовано: 13 дек. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.9

Описание

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

РелизСтатусПримечание
devel

released

4.2.0-1ubuntu4
hardy

DNE

lucid

DNE

oneiric

released

4.1.1-2ubuntu4.3
precise

released

4.1.2-2ubuntu2.3
quantal

released

4.1.3-3ubuntu1.1
raring

released

4.2.0-1ubuntu4
saucy

released

4.2.0-1ubuntu4
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 35%
0.00143
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

nvd
больше 12 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

debian
больше 12 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly c ...

github
около 3 лет назад

The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.

oracle-oval
больше 12 лет назад

ELSA-2012-1540: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 35%
0.00143
Низкий

6.9 Medium

CVSS2