CVE-2012-5513
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
13/12/2012
Last modified:
11/04/2025
Description
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* | 4.2.0 (including) | |
| cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2012-1540.html
- http://secunia.com/advisories/51397
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/51486
- http://secunia.com/advisories/51487
- http://secunia.com/advisories/51495
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://support.citrix.com/article/CTX135777
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/12/03/11
- http://www.osvdb.org/88131
- http://www.securityfocus.com/bid/56797
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80482
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2012-1540.html
- http://secunia.com/advisories/51397
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/51486
- http://secunia.com/advisories/51487
- http://secunia.com/advisories/51495
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://support.citrix.com/article/CTX135777
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/12/03/11
- http://www.osvdb.org/88131
- http://www.securityfocus.com/bid/56797
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80482



