SB2012121303 - Input validation error in Xen
Published: December 13, 2012 Updated: July 28, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2012-5513)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2012-1540.html
- http://secunia.com/advisories/51397
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/51486
- http://secunia.com/advisories/51487
- http://secunia.com/advisories/51495
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://support.citrix.com/article/CTX135777
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/12/03/11
- http://www.osvdb.org/88131
- http://www.securityfocus.com/bid/56797
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80482