Red Hat Customer Portal

Skip to main content

CVE-2012-3515

Impact:
Important
Public Date:
2012-09-05
CWE:
CWE-839->CWE-119
Bugzilla:
851252: CVE-2012-3515 qemu: VT100 emulation vulnerability

The MITRE CVE dictionary describes this issue as:

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

Find out more about CVE-2012-3515 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did affect the versions of xen package as shipped with Red Hat
Enterprise Linux 5.

This issue did affect the versions of kvm package as shipped with Red Hat
Enterprise Linux 5.

This issue did affect the versions of qemu-kvm package as shipped with Red Hat
Enterprise Linux 6.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 7.4
Base Metrics AV:A/AC:M/Au:S/C:C/I:C/A:C
Access Vector Adjacent Network
Access Complexity Medium
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (xen) RHSA-2012:1236 2012-09-05
RHEV Agents (vdsm) (qemu-kvm-rhev) RHSA-2012:1233 2012-09-05
Red Hat Enterprise Linux 6 (qemu-kvm) RHSA-2012:1234 2012-09-05
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2012:1325 2012-10-02
Red Hat Enterprise Linux Virtualization 5 (xen) RHSA-2012:1236 2012-09-05
Red Hat Enterprise Linux Virtualization 5 (kvm) RHSA-2012:1235 2012-09-05
RHEV Agents (VDSM) RHSA-2012:1262 2012-09-13

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 kvm Affected
Red Hat Enterprise Virtualization Hypervisor 5 rhev-hypervisor5 5.8-20120905.0.el5_8 Fixed

Acknowledgements

Red Hat would like to thank the Xen project for reporting this issue.

Last Modified