Vulnerabilities > XEN

DATE CVE VULNERABILITY TITLE RISK
2012-11-23 CVE-2012-6030 Improper Input Validation vulnerability in XEN 4.0.0/4.1.0/4.2.0
The do_tmem_op function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (host crash) and possibly have other unspecified impacts via unspecified vectors related to "broken locking checks" in an "error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
local
low complexity
xen CWE-20
7.2
2012-11-23 CVE-2012-3516 Permissions, Privileges, and Access Controls vulnerability in multiple products
The GNTTABOP_swap_grant_ref sub-operation in the grant table hypercall in Xen 4.2 and Citrix XenServer 6.0.2 allows local guest kernels or administrators to cause a denial of service (host crash) and possibly gain privileges via a crafted grant reference that triggers a write to an arbitrary hypervisor memory location.
6.9
2012-11-23 CVE-2012-3498 Improper Input Validation vulnerability in multiple products
PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map->index.
local
low complexity
citrix xen CWE-20
5.6
2012-11-23 CVE-2012-3497 Improper Input Validation vulnerability in XEN 4.0.0/4.1.0/4.2.0
(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.
local
xen CWE-20
6.9
2012-11-23 CVE-2012-3496 Configuration vulnerability in multiple products
XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
local
citrix xen CWE-16
4.7
2012-11-23 CVE-2012-3495 Improper Input Validation vulnerability in multiple products
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
local
low complexity
citrix xen CWE-20
6.1
2012-11-23 CVE-2012-3494 Permissions, Privileges, and Access Controls vulnerability in multiple products
The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.
local
low complexity
citrix xen CWE-264
2.1
2012-11-21 CVE-2012-4539 Resource Management Errors vulnerability in XEN
Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
local
low complexity
xen CWE-399
2.1
2012-11-21 CVE-2012-4537 Configuration vulnerability in XEN
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
local
low complexity
xen CWE-16
2.1
2012-11-21 CVE-2012-4536 Denial of Service vulnerability in XEN 2.2.0
The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
local
low complexity
xen
2.1