The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2012-11-23 20:55
Updated : 2024-02-04 18:16
NVD link : CVE-2012-3495
Mitre link : CVE-2012-3495
CVE.ORG link : CVE-2012-3495
JSON object : View
Products Affected
xen
- xen
citrix
- xenserver
CWE
CWE-20
Improper Input Validation