CVE Reference: CVE-2012-3495

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2012-3495

Description:
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

CVE Status:
Candidate

References:

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

ST
  1027480

SAID
  Secunia Advisory: SA51413
  Secunia Advisory: SA55082

MLIST
  http://www.openwall.com/lists/oss-security/2012/09/05/6
  http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html

GENTOO
  http://security.gentoo.org/glsa/glsa-201309-24.xml

CONFIRM
  http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593
  http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability
  http://support.citrix.com/article/CTX134708

BID
  55406


Return to the previous page.