CVE-2012-3515 in Citrix XenServer
Summary
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model s address space."
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Reservation
06/14/2012
Disclosure
11/23/2012
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 6107 | Citrix XenServer Qemu Emulator input validation | 20 | Not defined | Official fix | CVE-2012-3515 |
| 6105 | Citrix Xen Qemu Emulator input validation | 20 | Not defined | Official fix | CVE-2012-3515 |