CVE-2012-4535
Published Nov 21, 2012
Last updated 7 years ago
Overview
- Description
- Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 1.9
- Impact score
- 2.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F7D1B7E-C30F-430F-832D-2A405DA1F2D9" }, { "criteria": "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7C1D0AD-B804-474C-96A3-988BADA0DAD2" }, { "criteria": "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DCD1F05-9F96-40DD-B506-750E87306325" }, { "criteria": "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25B6AE42-E1EB-47A8-8FAF-7A93A67EC67F" }, { "criteria": "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60BADA43-94D5-4E80-B5C8-D01A0249F13E" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "550223A9-B9F1-440A-8C25-9F0F76AF7301" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC734D58-96E5-4DD2-8781-F8E0ADB96462" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62CEC1BF-1922-410D-BCBA-C58199F574C7" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "923F2C2B-4A65-4823-B511-D0FEB7C7FAB2" }, { "criteria": "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A24DED-B2EC-4D9C-9FA4-DD37EF3E3BFC" }, { "criteria": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D532B60-C8DD-4A2F-9D05-E574D23EB754" }, { "criteria": "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D83CA8B-8E49-45FA-8FAB-C15052474542" }, { "criteria": "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27537DF5-7E0F-463F-BA87-46E329EE07AC" }, { "criteria": "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EA4F978-9145-4FE6-B4F9-15207E52C40A" }, { "criteria": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00" } ], "operator": "OR" } ] } ]