CVE-2012-5511Improper Restriction of Operations within the Bounds of a Memory Buffer in XEN

Severity
4.7MEDIUMNVD
EPSS
0.1%
top 74.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 13
Latest updateMay 17

Description

Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.

CVSS vector

AV:L/AC:M/C:N/I:N/A:CExploitability: 3.4 | Impact: 6.9

Affected Packages3 packages

debiandebian/xen< xen 4.1.3-5 (bookworm)
Debianxen/xen< 4.1.3-5+3
NVDxen/xen11 versions+10

🔴Vulnerability Details

2
GHSA
GHSA-9qfq-67cw-h54c: Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 32022-05-17
OSV
CVE-2012-5511: Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 32012-12-13

📋Vendor Advisories

2
Red Hat
kernel: xen: several HVM operations do not validate the range of their inputs2012-12-03
Debian
CVE-2012-5511: xen - Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen...2012

💬Community

3
Bugzilla
CVE-2012-6333 kernel: xen: Several HVM operations do not validate the range of their inputs (a different vulnerability than CVE-2012-5511)2012-12-13
Bugzilla
CVE-2012-5511 CVE-2012-6333 kernel: xen: several HVM operations do not validate the range of their inputs [fedora-all]2012-12-03
Bugzilla
CVE-2012-5511 CVE-2012-6333 kernel: xen: several HVM operations do not validate the range of their inputs2012-11-16