Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-2542-1 | qemu-kvm security update |
![]() |
DSA-2543-1 | xen-qemu-dm-4.0 security update |
![]() |
DSA-2545-1 | qemu security update |
![]() |
EUVD-2012-3470 | Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." |
![]() |
USN-1590-1 | QEMU vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T20:05:12.755Z
Reserved: 2012-06-14T00:00:00
Link: CVE-2012-3515

No data.

Status : Deferred
Published: 2012-11-23T20:55:03.523
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-3515


No data.