cve/2012/CVE-2012-3495.md

18 lines
846 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2012-3495](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/hinj/hInjector