Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6036

Опубликовано: 23 нояб. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.4

Описание

The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tmemc_restore_flush_page functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 do not check for negative id pools, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or possibly execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

РелизСтатусПримечание
devel

ignored

hardy

DNE

lucid

DNE

natty

DNE

oneiric

ignored

precise

ignored

quantal

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 33%
0.00129
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tmemc_restore_flush_page functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 do not check for negative id pools, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or possibly execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

debian
около 13 лет назад

The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tm ...

github
больше 3 лет назад

The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tmemc_restore_flush_page functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 do not check for negative id pools, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or possibly execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

EPSS

Процентиль: 33%
0.00129
Низкий

4.4 Medium

CVSS2

Уязвимость CVE-2012-6036