CVE-2012-6034

The (1) tmemc_save_get_next_page and (2) tmemc_save_get_next_inv functions and the (3) TMEMC_SAVE_GET_POOL_UUID sub-operation in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 "do not check incoming guest output buffer pointers," which allows local guest OS users to cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-11-23 20:55

Updated : 2024-02-04 18:16


NVD link : CVE-2012-6034

Mitre link : CVE-2012-6034

CVE.ORG link : CVE-2012-6034


JSON object : View

Products Affected

xen

  • xen
CWE
CWE-20

Improper Input Validation