CVE-2012-3494
Published Nov 23, 2012
Last updated 7 years ago
Overview
- Description
- The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2FB5F3E5-D607-4BF5-9BB5-187D2F683F18", "versionEndIncluding": "6.0.2" }, { "criteria": "cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "CE28A81B-5201-4D49-888C-0160EF78D5F9", "versionEndIncluding": "6.0.2" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "A5B2BADE-24F0-45A0-BB36-5B0D76D93F5C" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "E5CCBFE1-4C48-4F64-8DDC-4A29EC5EBEF7" }, { "criteria": "cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "16FAE1DD-5E59-407A-857C-244814475212" }, { "criteria": "cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "855FD6AA-3288-49C4-BA09-D3685F5928E3" }, { "criteria": "cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "93206518-71F7-47A6-B980-06D8B0D3B5CE" }, { "criteria": "cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "D66B1908-FEEF-455E-8C26-65139BF59900" } ], "operator": "OR" } ] } ]