SB2012112307 - Multiple vulnerabilities in Xen 



SB2012112307 - Multiple vulnerabilities in Xen

Published: November 23, 2012 Updated: August 11, 2020

Security Bulletin ID SB2012112307
Severity
High
Patch available
NO
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 18% Medium 64% Low 18%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2013-0154)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debugging is enabled, allows local PV or HVM guest administrators to cause a denial of service (assertion failure and hypervisor crash) via unspecified vectors related to a hypercall.


2) Resource management error (CVE-ID: CVE-2012-6333)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input.


3) Input validation error (CVE-ID: CVE-2012-5525)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.


4) Input validation error (CVE-ID: CVE-2012-6030)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The do_tmem_op function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (host crash) and possibly have other unspecified impacts via unspecified vectors related to "broken locking checks" in an "error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.


5) Input validation error (CVE-ID: CVE-2012-6031)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The do_tmem_get function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (CPU hang and host crash) via unspecified vectors related to a spinlock being held in the "bad_copy error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.


6) Input validation error (CVE-ID: CVE-2012-6032)

The vulnerability allows local guest OS users to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (memory corruption and host crash) via unspecified vectors.


7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-6033)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.


8) Input validation error (CVE-ID: CVE-2012-6034)

The vulnerability allows local guest OS users to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors.


9) Input validation error (CVE-ID: CVE-2012-6035)

The vulnerability allows local guest OS users to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors.


10) Input validation error (CVE-ID: CVE-2012-6036)

The vulnerability allows local guest OS users to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (memory corruption and host crash) or possibly execute arbitrary code via unspecified vectors.


11) Information disclosure (CVE-ID: CVE-2012-4411)

The vulnerability allows a local #AU# to gain access to sensitive information.

The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor. NOTE: this might be a duplicate of CVE-2007-0998.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.

References