CVE-2012-0217 (CNNVD-201206-156)
中文标题:
Microsoft Windows Server ‘User Mode Scheduler’ 缓冲区错误漏洞
英文标题:
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6....
漏洞描述
中文描述:
Microsoft Windows Server 2008是美国微软(Microsoft)公司的一套服务器操作系统。 基于x64平台的Microsoft Windows Server 2008 R2和R2 SP1版本,Windows 7 Gold和SP1版本中的内核中的User Mode Scheduler中存在漏洞,该漏洞源于未正确处理系统请求。本地用户可利用该漏洞通过特制的应用程序获取权限。也称“用户模式任务调度器内存破坏漏洞”。
英文描述:
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| freebsd | freebsd | * | - | - |
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
|
| illumos | illumos | * | - | - |
cpe:2.3:o:illumos:illumos:*:*:*:*:*:*:*:*
|
| joyent | smartos | * | - | - |
cpe:2.3:o:joyent:smartos:*:*:*:*:*:*:*:*
|
| xen | xen | * | - | - |
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
|
| xen | xen | 4.0.0 | - | - |
cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
|
| xen | xen | 4.0.1 | - | - |
cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
|
| xen | xen | 4.0.2 | - | - |
cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
|
| xen | xen | 4.0.3 | - | - |
cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
|
| xen | xen | 4.0.4 | - | - |
cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
|
| xen | xen | 4.1.0 | - | - |
cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
|
| xen | xen | 4.1.1 | - | - |
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
|
| microsoft | windows_7 | * | - | - |
cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*
|
| microsoft | windows_server_2003 | * | - | - |
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
|
| microsoft | windows_xp | * | - | - |
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
|
| citrix | xenserver | * | - | - |
cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
|
| citrix | xenserver | 6.0 | - | - |
cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
|
| netbsd | netbsd | * | - | - |
cpe:2.3:o:netbsd:netbsd:*:beta:*:*:*:*:*:*
|
| sun | sunos | * | - | - |
cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
CVSS评分详情
AV:L/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2012-0217 |
2025-11-11 15:18:26 | 2025-11-11 07:33:20 |
| NVD | nvd_CVE-2012-0217 |
2025-11-11 14:53:57 | 2025-11-11 07:42:09 |
| CNNVD | cnnvd_CNNVD-201206-156 |
2025-11-11 15:09:16 | 2025-11-11 07:50:08 |
| EXPLOITDB | exploitdb_EDB-20861 |
2025-11-11 15:05:59 | 2025-11-11 08:15:55 |
| EXPLOITDB | exploitdb_EDB-28718 |
2025-11-11 15:05:21 | 2025-11-11 08:24:23 |
| EXPLOITDB | exploitdb_EDB-46508 |
2025-11-11 15:05:21 | 2025-11-11 08:50:44 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 28 -> 30
- tags_count: 8 -> 10
查看详细变更
- references_count: 26 -> 28
- tags_count: 5 -> 8
查看详细变更
- references_count: 23 -> 26
- tags_count: 0 -> 5
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-201206-156
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.2
- cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 19
- data_sources: ['cve'] -> ['cve', 'nvd']