CVE-2012-4539
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
21/11/2012
Last modified:
11/04/2025
Description
Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
- http://secunia.com/advisories/51200
- http://secunia.com/advisories/51324
- http://secunia.com/advisories/51352
- http://secunia.com/advisories/51413
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/11/13/4
- http://www.osvdb.org/87305
- http://www.securityfocus.com/bid/56498
- http://www.securitytracker.com/id?1027763=
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
- https://security.gentoo.org/glsa/201604-03
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
- http://secunia.com/advisories/51200
- http://secunia.com/advisories/51324
- http://secunia.com/advisories/51352
- http://secunia.com/advisories/51413
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/11/13/4
- http://www.osvdb.org/87305
- http://www.securityfocus.com/bid/56498
- http://www.securitytracker.com/id?1027763=
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
- https://security.gentoo.org/glsa/201604-03



