ID CVE-2012-5525
Summary The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
References
Vulnerable Configurations
  • Xen 4.2.0
    cpe:2.3:o:xen:xen:4.2.0
CVSS
Base: 4.7 (as of 13-12-2012 - 15:02)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
metasploit via4
description This module causes a hypervisor crash in Xen 4.2.0 when invoked from a paravirtualized VM, including from dom0. Successfully tested on Debian 7 3.2.0-4-amd64 with Xen 4.2.0.
id MSF:POST/LINUX/DOS/XEN_420_DOS
last seen 2019-01-25
modified 2017-09-17
published 2016-04-13
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/post/linux/dos/xen_420_dos.rb
title Linux DoS Xen 4.2.0 2012-5525
nessus via4
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-19652.NASL
    description A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082) An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511] (#883084) A PV guest can cause xen to crash and might be able escalate privileges [XSA-29, CVE-2012-5513] (#883088) An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091) A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092) A PV guest can cause xen to crash and might be able escalate privileges [XSA-32, CVE-2012-5525] (#883094) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 63239
    published 2012-12-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=63239
    title Fedora 18 : xen-4.2.0-6.fc18 (2012-19652)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201309-24.NASL
    description The remote host is affected by the vulnerability described in GLSA-201309-24 (Xen: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details. Impact : Guest domains could possibly gain privileges, execute arbitrary code, or cause a Denial of Service on the host domain (Dom0). Additionally, guest domains could gain information about other virtual machines running on the same host or read arbitrary files on the host. Workaround : The CVEs listed below do not currently have fixes, but only apply to Xen setups which have “tmem” specified on the hypervisor command line. TMEM is not currently supported for use in production systems, and administrators using tmem should disable it. Relevant CVEs: * CVE-2012-2497 * CVE-2012-6030 * CVE-2012-6031 * CVE-2012-6032 * CVE-2012-6033 * CVE-2012-6034 * CVE-2012-6035 * CVE-2012-6036
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 70184
    published 2013-09-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70184
    title GLSA-201309-24 : Xen: Multiple vulnerabilities
refmap via4
bid 56805
gentoo GLSA-201309-24
mlist [oss-security] 20121203 Xen Security Advisory 26 (CVE-2012-5510) - Grant table version switch list corruption vulnerability
osvdb 88133
secunia
  • 51397
  • 55082
xf xen-getpagefromgfn-dos(80480)
Last major update 10-10-2013 - 23:47
Published 13-12-2012 - 06:53
Last modified 28-08-2017 - 21:32
Back to Top