CVE Reference: CVE-2012-3497

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2012-3497

Description:
(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/78268

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
  http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html

ST
  1027482

SAID
  Secunia Advisory: SA50472
  Secunia Advisory: SA51413
  Secunia Advisory: SA51324
  Secunia Advisory: SA51352
  Secunia Advisory: SA55082

OSVDB
  85199

MLIST
  http://www.openwall.com/lists/oss-security/2012/09/05/8
  http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html

GENTOO
  http://security.gentoo.org/glsa/glsa-201309-24.xml

CONFIRM
  http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities

BID
  55410


Return to the previous page.