The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://secunia.com/advisories/55082 | third party advisory |
http://www.securitytracker.com/id?1027482 | vdb entry |
http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities | |
http://security.gentoo.org/glsa/glsa-201309-24.xml | vendor advisory |
http://www.securityfocus.com/bid/55410 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/09/05/8 | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78268 | vdb entry |
http://osvdb.org/85199 | vdb entry |
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html | vendor advisory mailing list |
http://secunia.com/advisories/50472 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201604-03 | vendor advisory |