{
  "threat_severity" : "Moderate",
  "public_date" : "2012-10-26T00:00:00Z",
  "bugzilla" : {
    "description" : "xen: Xen domain builder Out-of-memory due to malicious kernel/ramdisk",
    "id" : "870412",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=870412"
  },
  "cvss" : {
    "cvss_base_score" : "2.7",
    "cvss_scoring_vector" : "AV:A/AC:L/Au:S/C:N/I:N/A:P",
    "status" : "verified"
  },
  "details" : [ "The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk." ],
  "acknowledgement" : "Red Hat would like to thank Xen project for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2013-02-07T00:00:00Z",
    "advisory" : "RHSA-2013:0241",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "xen-0:3.0.3-142.el5_9.1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 5.9",
    "fix_state" : "Affected",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-4544\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-4544" ],
  "name" : "CVE-2012-4544",
  "csaw" : false
}