ID |
CVE-2012-0218
|
Summary |
Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest crash) by later triggering an exception that would normally be handled within Xen. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 1.9 (as of 11-10-2013 - 03:40) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:L/AC:M/Au:N/C:N/I:N/A:P
|
refmap
via4
|
debian | DSA-2501 | gentoo | GLSA-201309-24 | mlist | [Xen-announce] 20120612 Xen Security Advisory 8 (CVE-2012-0218) - syscall/enter guest DoS | secunia | 55082 |
|
Last major update |
11-10-2013 - 03:40 |
Published |
03-12-2012 - 21:55 |
Last modified |
11-10-2013 - 03:40 |