7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
28.7%
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a “device model’s address space.”
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | qemu | < 1.1.2+dfsg-1 | qemu_1.1.2+dfsg-1_all.deb |
Debian | 11 | all | qemu | < 1.1.2+dfsg-1 | qemu_1.1.2+dfsg-1_all.deb |
Debian | 10 | all | qemu | < 1.1.2+dfsg-1 | qemu_1.1.2+dfsg-1_all.deb |
Debian | 999 | all | qemu | < 1.1.2+dfsg-1 | qemu_1.1.2+dfsg-1_all.deb |
Debian | 13 | all | qemu | < 1.1.2+dfsg-1 | qemu_1.1.2+dfsg-1_all.deb |
Debian | 12 | all | xen | < 4.1.3-2 | xen_4.1.3-2_all.deb |
Debian | 11 | all | xen | < 4.1.3-2 | xen_4.1.3-2_all.deb |
Debian | 10 | all | xen | < 4.1.3-2 | xen_4.1.3-2_all.deb |
Debian | 999 | all | xen | < 4.1.3-2 | xen_4.1.3-2_all.deb |
Debian | 13 | all | xen | < 4.1.3-2 | xen_4.1.3-2_all.deb |