Permissions, Privileges, and Access Controls in Xen - CVE-2012-6033

 

Permissions, Privileges, and Access Controls in Xen - CVE-2012-6033

Published: November 23, 2012 / Updated: August 11, 2020


Vulnerability identifier: #VU43301
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2012-6033
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Xen Project
Affected software:
Xen

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.


How to mitigate CVE-2012-6033

Install update from vendor's website.

Sources