6.2 Medium
AI Score
Confidence
Low
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
24.6%
The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
osvdb.org/85199
secunia.com/advisories/50472
secunia.com/advisories/55082
security.gentoo.org/glsa/glsa-201309-24.xml
wiki.xen.org/wiki/Security_Announcements
www.openwall.com/lists/oss-security/2012/09/05/8
www.securityfocus.com/bid/55410
www.securitytracker.com/id?1027482
exchange.xforce.ibmcloud.com/vulnerabilities/78268
security.gentoo.org/glsa/201604-03