CERTA-2012-AVI-485

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été corrigées dans Xen. Elles concernent des dénis de service et des élévations de privilèges, y compris des systèmes invités vers l'hôte.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Toutes les versions de Xen 4 (4.0, 4.1, 4.2, Xen-unstable) sont affectées par au moins une des vulnérabilités.

Se référer aux bulletins de sécurité de l'éditeur pour le détail exact des configurations impactées.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eToutes les versions de Xen 4 (4.0, 4.1,  4.2, Xen-unstable) sont affect\u00e9es par au moins une des  vuln\u00e9rabilit\u00e9s.  \u003cP\u003eSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour le  d\u00e9tail exact des configurations impact\u00e9es.\u003c/P\u003e\u003c/p\u003e",
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-3497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3497"
    },
    {
      "name": "CVE-2012-3516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3516"
    },
    {
      "name": "CVE-2012-3496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3496"
    },
    {
      "name": "CVE-2012-3495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3495"
    },
    {
      "name": "CVE-2012-3494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3494"
    },
    {
      "name": "CVE-2012-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3515"
    },
    {
      "name": "CVE-2012-3498",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-3498"
    }
  ],
  "links": [
    {
      "title": "Xen Security Advisory 13 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html"
    },
    {
      "title": "Xen Security Advisory 17 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html"
    },
    {
      "title": "Xen Security Advisory 15 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html"
    },
    {
      "title": "Xen Security Advisory 18 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00004.html"
    },
    {
      "title": "Xen Security Advisory 14 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html"
    },
    {
      "title": "Xen Security Advisory 16 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00005.html"
    },
    {
      "title": "Xen Security Advisory 12 :",
      "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html"
    }
  ],
  "reference": "CERTA-2012-AVI-485",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-09-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Xen. Elles concernent\ndes d\u00e9nis de service et des \u00e9l\u00e9vations de privil\u00e8ges, y compris des\nsyst\u00e8mes invit\u00e9s vers l\u0027h\u00f4te.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletins de s\u00e9curit\u00e9 Xen 12 \u00e0 18",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…