ID CVE-2012-4536
Summary The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
References
Vulnerable Configurations
  • cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 29-08-2017 - 01:32)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 56498
gentoo
  • GLSA-201309-24
  • GLSA-201604-03
mlist
  • [Xen-announce] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability
  • [oss-security] 20121113 Xen Security Advisory 21 (CVE-2012-4536) - pirq range check DoS vulnerability
osvdb 87297
sectrack 1027760
secunia
  • 51200
  • 51324
  • 51352
  • 51413
  • 55082
suse
  • SUSE-SU-2012:1486
  • SUSE-SU-2012:1487
  • openSUSE-SU-2012:1572
  • openSUSE-SU-2012:1573
xf xen-domainpirqtoemuirq-dos(80023)
Last major update 29-08-2017 - 01:32
Published 21-11-2012 - 23:55
Last modified 29-08-2017 - 01:32
Back to Top