Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Opensuse Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Workstation Subscribe
Rhel Virtualization Subscribe
Virtualization Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise Server Subscribe
Linux Enterprise Software Development Kit Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2542-1 qemu-kvm security update
Debian DSA Debian DSA DSA-2543-1 xen-qemu-dm-4.0 security update
Debian DSA Debian DSA DSA-2545-1 qemu security update
EUVD EUVD EUVD-2012-3470 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
Ubuntu USN Ubuntu USN USN-1590-1 QEMU vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html cve-icon cve-icon
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1233.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1234.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1235.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1236.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1262.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1325.html cve-icon cve-icon
http://secunia.com/advisories/50472 cve-icon cve-icon
http://secunia.com/advisories/50528 cve-icon cve-icon
http://secunia.com/advisories/50530 cve-icon cve-icon
http://secunia.com/advisories/50632 cve-icon cve-icon
http://secunia.com/advisories/50689 cve-icon cve-icon
http://secunia.com/advisories/50860 cve-icon cve-icon
http://secunia.com/advisories/50913 cve-icon cve-icon
http://secunia.com/advisories/51413 cve-icon cve-icon
http://secunia.com/advisories/55082 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-201309-24.xml cve-icon cve-icon
http://support.citrix.com/article/CTX134708 cve-icon cve-icon
http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability cve-icon cve-icon
http://www.debian.org/security/2012/dsa-2543 cve-icon cve-icon
http://www.debian.org/security/2012/dsa-2545 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2012/09/05/10 cve-icon cve-icon
http://www.securityfocus.com/bid/55413 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-1590-1 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2012-3515 cve-icon
https://security.gentoo.org/glsa/201604-03 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2012-3515 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T20:05:12.755Z

Reserved: 2012-06-14T00:00:00

Link: CVE-2012-3515

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-11-23T20:55:03.523

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-3515

cve-icon Redhat

Severity : Important

Publid Date: 2012-09-05T00:00:00Z

Links: CVE-2012-3515 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses