| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Citrix Xen up to 4.2.0. It has been classified as problematic. This affects the function set_p2m_entry. This manipulation causes config.
The identification of this vulnerability is CVE-2012-4537. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
Details
A vulnerability classified as problematic was found in Citrix Xen up to 4.2.0 (Connectivity Software). Affected by this vulnerability is the function set_p2m_entry. The manipulation with an unknown input leads to a config vulnerability. The CWE definition for the vulnerability is CWE-16. As an impact it is known to affect availability. The summary by CVE is:
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
The weakness was shared 11/13/2012 as msg00005 as confirmed posting (Website). The advisory is shared at lists.xen.org. The vendor cooperated in the coordination of the public release. This vulnerability is known as CVE-2012-4537 since 08/21/2012. An attack has to be approached locally. The requirement for exploitation is a single authentication. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1592.004 for this issue.
The vulnerability scanner Nessus provides a plugin with the ID 63171 (CentOS 5 : kernel (CESA-2012:1540)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CentOS Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 370051 (Citrix XenServer Security Update (CTX135458)).
Applying the patch xsa22-VERSION is able to eliminate this problem. The bugfix is ready for download at lists.xen.org. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (80024), Tenable (63171), SecurityFocus (BID 56498†), OSVDB (87307†) and Secunia (SA51200†). The entries VDB-6939, VDB-6940, VDB-6947 and VDB-6948 are related to this item. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.citrix.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.5VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.5
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: ConfigCWE: CWE-16
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 63171
Nessus Name: CentOS 5 : kernel (CESA-2012:1540)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 892582
OpenVAS Name: Debian Security Advisory DSA 2582-1 (xen - several vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: xsa22-VERSION
Timeline
08/21/2012 🔍11/13/2012 🔍
11/13/2012 🔍
11/13/2012 🔍
11/13/2012 🔍
11/14/2012 🔍
11/14/2012 🔍
11/14/2012 🔍
11/16/2012 🔍
11/21/2012 🔍
11/28/2012 🔍
04/19/2021 🔍
Sources
Vendor: citrix.comAdvisory: msg00005
Status: Confirmed
Coordinated: 🔍
CVE: CVE-2012-4537 (🔍)
GCVE (CVE): GCVE-0-2012-4537
GCVE (VulDB): GCVE-100-6949
OVAL: 🔍
X-Force: 80024 - Xen set_p2m_entry() denial of service, Medium Risk
SecurityFocus: 56498 - Xen Multiple Denial of Service Vulnerabilities
Secunia: 51200 - Xen Multiple Denial of Service Vulnerabilities, Not Critical
OSVDB: 87307
SecurityTracker: 1027761 - Xen Memory Mapping Bug Lets Local Guest Administrative Users Deny Service
Vulnerability Center: 37448 - XenSource and Citrix XenServer Local Guest Administrators Denial of Service - CVE-2012-4537, Low
See also: 🔍
Entry
Created: 11/16/2012 12:13Updated: 04/19/2021 12:11
Changes: 11/16/2012 12:13 (86), 04/22/2017 09:09 (6), 04/19/2021 12:11 (3)
Complete: 🔍
Committer: olku
Cache ID: 216:325:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.