The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.

Subscriptions

Vendors Products
Xenserver Subscribe
Freebsd Subscribe
Freebsd Subscribe
Illumos Subscribe
Illumos Subscribe
Smartos Subscribe
Microsoft Subscribe
Windows 7 Subscribe
Windows Server 2003 Subscribe
Windows Server 2008 Subscribe
Windows Xp Subscribe
Enterprise Linux Subscribe
Rhel Eus Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2501-1 xen security update
Debian DSA Debian DSA DSA-2508-1 kfreebsd-8 security update
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-06T18:16:19.831Z

Reserved: 2011-12-14T00:00:00.000Z

Link: CVE-2012-0217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-06-12T22:55:01.343

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-0217

cve-icon Redhat

Severity : Important

Publid Date: 2012-06-12T00:00:00Z

Links: CVE-2012-0217 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses