Resource management error in Xen - CVE-2012-4535
Published: November 22, 2012 / Updated: July 28, 2020
Vulnerability identifier: #VU32733
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2012-4535
CWE-ID: CWE-399
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Xen Project
Affected software:
Xen
Xen
Detailed vulnerability description
The vulnerability allows a local non-authenticated attacker to perform service disruption.
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
How to mitigate CVE-2012-4535
Install update from vendor's website.
Sources
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
- http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html
- http://osvdb.org/87298
- http://rhn.redhat.com/errata/RHSA-2012-1540.html
- http://secunia.com/advisories/51200
- http://secunia.com/advisories/51324
- http://secunia.com/advisories/51352
- http://secunia.com/advisories/51413
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/11/13/1
- http://www.securityfocus.com/bid/56498
- http://www.securitytracker.com/id?1027759
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80022
- https://security.gentoo.org/glsa/201604-03