CVE-2012-3515 in Citrix XenServerinfo

Summary

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model s address space."

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservation

06/14/2012

Disclosure

11/23/2012

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!