6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
41.5%
The do_tmem_destroy_pool function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly validate pool ids, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 11 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 10 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 999 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 13 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |