CVE-2012-0217
Summary
| CVE | CVE-2012-0217 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-06-12 22:55:00 UTC |
| Updated | 2020-09-28 12:58:00 UTC |
| Description | The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Citrix | Xenserver | 6.0 | All | All | All |
| Application | Citrix | Xenserver | 6.0 | All | All | All |
| Application | Citrix | Xenserver | All | All | All | All |
| Operating System | Freebsd | Freebsd | All | All | All | All |
| Operating System | Illumos | Illumos | All | All | All | All |
| Operating System | Joyent | Smartos | All | All | All | All |
| Operating System | Microsoft | Windows 7 | All | All | x64 | All |
| Operating System | Microsoft | Windows 7 | All | sp1 | x64 | All |
| Operating System | Microsoft | Windows 7 | All | All | x64 | All |
| Operating System | Microsoft | Windows 7 | All | sp1 | x64 | All |
| Operating System | Microsoft | Windows Server 2003 | All | sp2 | All | All |
| Operating System | Microsoft | Windows Server 2003 | All | sp2 | All | All |
| Operating System | Microsoft | Windows Server 2008 | r2 | All | x64 | All |
| Operating System | Microsoft | Windows Server 2008 | r2 | All | x64 | All |
| Operating System | Microsoft | Windows Xp | All | sp3 | All | All |
| Operating System | Microsoft | Windows Xp | All | sp3 | All | All |
| Operating System | Netbsd | Netbsd | All | beta | All | All |
| Operating System | Sun | Sunos | All | All | All | All |
| Operating System | Xen | Xen | 4.0.0 | All | All | All |
| Operating System | Xen | Xen | 4.0.1 | All | All | All |
| Operating System | Xen | Xen | 4.0.2 | All | All | All |
| Operating System | Xen | Xen | 4.0.3 | All | All | All |
| Operating System | Xen | Xen | 4.0.4 | All | All | All |
| Operating System | Xen | Xen | 4.1.0 | All | All | All |
| Operating System | Xen | Xen | 4.1.1 | All | All | All |
| Operating System | Xen | Xen | 4.0.0 | All | All | All |
| Operating System | Xen | Xen | 4.0.1 | All | All | All |
| Operating System | Xen | Xen | 4.0.2 | All | All | All |
| Operating System | Xen | Xen | 4.0.3 | All | All | All |
| Operating System | Xen | Xen | 4.0.4 | All | All | All |
| Operating System | Xen | Xen | 4.1.0 | All | All | All |
| Operating System | Xen | Xen | 4.1.1 | All | All | All |
| Operating System | Xen | Xen | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Citrix XenServer Multiple Security Updates | CONFIRM | support.citrix.com | |
| Microsoft Security Bulletin MS12-042 - Important | Microsoft Docs | MS | docs.microsoft.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| [Xen-devel] Security vulnerability process, and CVE-2012-0217 | MLIST | lists.xen.org | |
| SmartOS Change Log - SmartOS Documentation - SmartOS Wiki | CONFIRM | wiki.smartos.org | |
| Bug 813428 – CVE-2012-0217 kernel: x86-64: avoid sysret to non-canonical address | CONFIRM | bugzilla.redhat.com | |
| FreeBSD-SA-12:04 | FREEBSD | security.freebsd.org | |
| illumos gate - Bug #2873: sysretq doesn't properly handle non-canonical addresses - illumos.org | CONFIRM | www.illumos.org | |
| Vulnerability Note VU#649219 - SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware | CERT-VN | www.kb.cert.org | US Government Resource |
| US-CERT Alert TA12-164A -- Microsoft Updates for Multiple Vulnerabilities | CERT | www.us-cert.gov | US Government Resource |
| NetBSD-SA2012-003 | NETBSD | ftp.netbsd.org | |
| Debian -- Security Information -- DSA-2508-1 kfreebsd-8 | DEBIAN | www.debian.org | |
| The Intel SYSRET privilege escalation – blog.xen.org | CONFIRM | blog.xen.org | |
| Oracle Critical Patch Update - October 2012 | CONFIRM | www.oracle.com | |
| Support / Security / Advisories / / MDVSA-2013:150 | Mandriva | MANDRIVA | www.mandriva.com | |
| [Xen-announce] Xen Security Advisory 7 (CVE-2012-0217) - PV privilege escalation | MLIST | lists.xen.org | |
| Security Advisory SA55082 - Gentoo update for xen - Secunia | SECUNIA | secunia.com | |
| Gentoo Linux Documentation -- Xen: Multiple vulnerabilities | GENTOO | security.gentoo.org | |
| FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) - FreeBSD_x86-64 local Exploit | EXPLOIT-DB | www.exploit-db.com | |
| illumos» Blog Archive » Patch for illumos CERT Vulnerability | CONFIRM | blog.illumos.org | |
| SmartOS News: June 15, 2012 – SmartOS.org | CONFIRM | smartos.org | |
| Debian -- Security Information -- DSA-2501-1 xen | DEBIAN | www.debian.org | |
| FreeBSD Intel SYSRET Kernel Privilege Escalation Exploit | EXPLOIT-DB | www.exploit-db.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.