CERTA-2012-AVI-485
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans Xen. Elles concernent des dénis de service et des élévations de privilèges, y compris des systèmes invités vers l'hôte.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Toutes les versions de Xen 4 (4.0, 4.1, 4.2, Xen-unstable) sont affectées par au moins une des vulnérabilités.

Se référer aux bulletins de sécurité de l'éditeur pour le détail exact des configurations impactées.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eToutes les versions de Xen 4 (4.0, 4.1,  4.2, Xen-unstable) sont affect\u00e9es par au moins une des  vuln\u00e9rabilit\u00e9s.  \u003cP\u003eSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour le  d\u00e9tail exact des configurations impact\u00e9es.\u003c/P\u003e\u003c/p\u003e",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-3497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3497"
    },
    {
      "name": "CVE-2012-3516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3516"
    },
    {
      "name": "CVE-2012-3496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3496"
    },
    {
      "name": "CVE-2012-3495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3495"
    },
    {
      "name": "CVE-2012-3494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3494"
    },
    {
      "name": "CVE-2012-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515"
    },
    {
      "name": "CVE-2012-3498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3498"
    }
  ],
  "initial_release_date": "2012-09-06T00:00:00",
  "last_revision_date": "2012-09-06T00:00:00",
  "links": [
    {
      "title": "Xen Security Advisory 13 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html"
    },
    {
      "title": "Xen Security Advisory 17 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html"
    },
    {
      "title": "Xen Security Advisory 15 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html"
    },
    {
      "title": "Xen Security Advisory 18 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00004.html"
    },
    {
      "title": "Xen Security Advisory 14 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html"
    },
    {
      "title": "Xen Security Advisory 16 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00005.html"
    },
    {
      "title": "Xen Security Advisory 12 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html"
    }
  ],
  "reference": "CERTA-2012-AVI-485",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-09-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Xen. Elles concernent\ndes d\u00e9nis de service et des \u00e9l\u00e9vations de privil\u00e8ges, y compris des\nsyst\u00e8mes invit\u00e9s vers l\u0027h\u00f4te.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 Xen 12 \u00e0 18",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…