First published: Thu Aug 23 2012(Updated: )
set_debugreg allows writes to reserved bits of the DR7 debug control register on x86-64. A malicious guest can cause the host to crash, leading to a DoS. If the vulnerable hypervisor is run on future hardware, the impact of the vulnerability might be widened depending on the future assignment of the currently-reserved debug register bits. All systems running 64-bit paravirtualised guests are vulnerable to this issue. Acknowledgements: Red Hat would like to thank the Xen project for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | <=6.0.2 | |
XenServer | <=6.0.2 | |
Xen XAPI | =4.0.0 | |
Xen XAPI | =4.0.0 | |
Xen XAPI | =4.1.0 | |
Xen XAPI | =4.1.0 | |
Xen XAPI | =4.2.0 | |
Xen XAPI | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3494 has been classified as a high severity vulnerability due to its potential to allow unauthorized access to reserved bits in the debug control register.
To mitigate CVE-2012-3494, it is recommended to update to the latest version of Citrix XenServer or Xen that has addressed this vulnerability.
CVE-2012-3494 affects Citrix XenServer versions up to and including 6.0.2 and Xen versions 4.0.0, 4.1.0, and 4.2.0.
CVE-2012-3494 impacts x86 and x86-64 architectures running vulnerable versions of Citrix XenServer and Xen.
There are no specific workarounds for CVE-2012-3494, so upgrading to a patched version is the best course of action.