Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The (1) tmemc_save_get_next_page and (2) tmemc_save_get_next_inv functions and the (3) TMEMC_SAVE_GET_POOL_UUID sub-operation in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 "do not check incoming guest output buffer pointers," which allows local guest OS users to cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Xen Transcendent Memory 任意代码漏洞
Vulnerability Description
Xen是英国剑桥大学开发的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 4.0,4.1,4.2版本中的Transcendent Memory (TMEM)中的(1)tmemc_save_get_next_page(2)tmemc_save_get_next_inv函数(3)TMEMC_SAVE_GET_POOL_UUID子操作中存在漏洞,该漏洞源于‘未检查来访访客所输出的缓冲区指针’。具有访客系统权限的本地攻
CVSS Information
N/A
Vulnerability Type
N/A