HIGH · 7.2

CVE-2012-3515

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequ...

Vulnerability Description

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

CVSS Score

7.2

HIGH

AV:L/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
QemuQemu< 1.2.0
XenXen4.0.0
OpensuseOpensuse11.4
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit10
RedhatVirtualization3.0
RedhatEnterprise Linux6.0
RedhatEnterprise Linux Desktop5.0
RedhatEnterprise Linux Eus6.3
RedhatEnterprise Linux Server5.0
RedhatEnterprise Linux Workstation5.0
DebianDebian Linux6.0
CanonicalUbuntu Linux10.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-3515?

CVE-2012-3515 is a vulnerability with a CVSS score of 7.2 (HIGH). Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequ...

How severe is CVE-2012-3515?

CVE-2012-3515 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-3515?

Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Xen Xen, Opensuse Opensuse, Suse Linux Enterprise Desktop, Suse Linux Enterprise Server.