Skip to navigation

CVE Database

CVE-2012-3515

Impact: Important
Public: 2012-09-05
CWE: CWE-839->CWE-119
Bugzilla: 851252: CVE-2012-3515 qemu: VT100 emulation vulnerability

Details

The MITRE CVE dictionary describes this issue as:

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

Find out more about CVE-2012-3515 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue did affect the versions of xen package as shipped with Red Hat
Enterprise Linux 5.

This issue did affect the versions of kvm package as shipped with Red Hat
Enterprise Linux 5.

This issue did affect the versions of qemu-kvm package as shipped with Red Hat
Enterprise Linux 6.

CVSS v2 metrics

Base Score: 7.4
Base Metrics: AV:A/AC:M/Au:S/C:C/I:C/A:C
Access Vector: Adjacent Network
Access Complexity: Medium
Authentication: Single Instance
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
RHEL Virtualization version 5 (kvm) RHSA-2012:1235 September 05, 2012
RHEL Virtualization version 5 (xen) RHSA-2012:1236 September 05, 2012
RHEV Agents (vdsm) (qemu-kvm-rhev) RHSA-2012:1233 September 05, 2012
RHEV Hypervisor for RHEL-5 (rhev-hypervisor5) RHSA-2012:1262 September 13, 2012
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2012:1325 October 02, 2012
Red Hat Enterprise Linux version 5 (xen) RHSA-2012:1236 September 05, 2012
Red Hat Enterprise Linux version 6 (qemu-kvm) RHSA-2012:1234 September 05, 2012

External References

Acknowledgements

Red Hat would like to thank the Xen project for reporting this issue.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.