Podatność CVE-2012-3515


Publikacja: 2012-11-23

Opis:
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
Med.
Citrix XenServer 6.0.2 Privilege Escalation
Context Informat...
31.10.2012

Typ:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
7.2/10
10/10
3.9/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Lokalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Pełny
Pełny
Pełny
Affected software
XEN -> XEN 
QEMU -> QEMU 

 Referencje:
http://git.qemu.org/?p=qemu-stable-0.15.git;a=log
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html
http://rhn.redhat.com/errata/RHSA-2012-1233.html
http://rhn.redhat.com/errata/RHSA-2012-1234.html
http://rhn.redhat.com/errata/RHSA-2012-1235.html
http://rhn.redhat.com/errata/RHSA-2012-1236.html
http://rhn.redhat.com/errata/RHSA-2012-1262.html
http://rhn.redhat.com/errata/RHSA-2012-1325.html
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://support.citrix.com/article/CTX134708
http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability
http://www.debian.org/security/2012/dsa-2543
http://www.debian.org/security/2012/dsa-2545
http://www.openwall.com/lists/oss-security/2012/09/05/10
http://www.securityfocus.com/bid/55413
http://www.ubuntu.com/usn/USN-1590-1
https://security.gentoo.org/glsa/201604-03

Copyright 2024, cxsecurity.com

 

Back to Top