CVE-2012-3495Improper Input Validation in Citrix Xenserver

Severity
6.1MEDIUMNVD
EPSS
0.1%
top 76.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 23
Latest updateMay 17

Description

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.

CVSS vector

AV:L/AC:L/C:P/I:P/A:CExploitability: 3.9 | Impact: 8.5

Affected Packages3 packages

NVDcitrix/xenserver6.0.2+4
Debianxen/xen< 4.1.3-2+3
NVDxen/xen4 versions+3

🔴Vulnerability Details

3
GHSA
GHSA-w2q9-w27j-m384: The physdev_get_free_pirq hypercall in arch/x86/physdev2022-05-17
CVEList
CVE-2012-3495: The physdev_get_free_pirq hypercall in arch/x86/physdev2012-11-23
OSV
CVE-2012-3495: The physdev_get_free_pirq hypercall in arch/x86/physdev2012-11-23

📋Vendor Advisories

3
Citrix
CVE-2012-3495: The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pi2012-11-23
Red Hat
kernel: xen: hypercall physdev_get_free_pirq vulnerability2012-09-05
Debian
CVE-2012-3495: xen - The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citri...2012

💬Community

2
Bugzilla
CVE-2012-3495 kernel: xen: hypercall physdev_get_free_pirq vulnerability [fedora-all]2012-09-05
Bugzilla
CVE-2012-3495 kernel: xen: hypercall physdev_get_free_pirq vulnerability2012-08-23
CVE-2012-3495 — Improper Input Validation in Citrix | cvebase