<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/cert-us/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Sun, 25 Nov 2012 15:04:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks</title>
		<link>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/</link>
					<comments>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 02:31:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Advanced Micro Devices]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[CERT-US]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=292</guid>

					<description><![CDATA[The US Computer Emergency Response Team (US-CERT) has advised that some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT.png"><img decoding="async" class="alignleft size-medium wp-image-363" title="US-CERT" src="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT-300x82.png" alt="" width="300" height="82" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT-300x82.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/US-CERT.png 691w" sizes="(max-width: 300px) 100vw, 300px" /></a>The <a title="United States Computer Emergency Readiness Team" href="http://www.us-cert.gov/" target="_blank">US Computer Emergency Response Team (US-CERT)</a> has advised that <a title="SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware" href="http://www.kb.cert.org/vuls/id/649219" target="_blank">some 64-bit operating systems and virtualization software running on Intel 64 CPU hardware are vulnerable</a> to a local privilege escalation attack. An attacker may exploit the vulnerability to escalate privileges or gain access to the host machine from a guest virtual machine.</p>
<p>The vulnerability is identified as CVE-2012-0217 and stems from the way Intel 64 CPUs have implemented the SYSRET instruction. The vulnerability can only be exploited on Intel CPUs when the Intel 64 extension is in use, that is, using a 64-bit OS; 32-bit OSes are not affected.</p>
<p><span id="more-292"></span>AMD does not implement the SYSRET instruction the same way and is not similarly affected. However, systems running on AMD64 chips may lock up under an attack and may therefore pose a Denial of Service (DoS) vulnerability.</p>
<p>A list of vendors and their vulnerability status is shown below. Note that this list may not be updated and you should check the CERT-US website for updates.</p>
<table id="vendor-info2" border="1px">
<tbody>
<tr>
<th width="120px">Vendor</th>
<th width="80px">Status</th>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MORO-8V9FNG" data-bitly-type="bitly_hover_card">Citrix</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPPR" data-bitly-type="bitly_hover_card">FreeBSD Project</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ2" data-bitly-type="bitly_hover_card">Intel Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MORO-8V9FQC" data-bitly-type="bitly_hover_card">Joyent</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ5" data-bitly-type="bitly_hover_card">Microsoft Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQ8" data-bitly-type="bitly_hover_card">NetBSD</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQB" data-bitly-type="bitly_hover_card">Oracle Corporation</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQE" data-bitly-type="bitly_hover_card">Red Hat, Inc.</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWHYB" data-bitly-type="bitly_hover_card">SUSE Linux</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWQ9S" data-bitly-type="bitly_hover_card">Xen</a></td>
<td>Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/JALR-8V8LFS" data-bitly-type="bitly_hover_card">AMD</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPPN" data-bitly-type="bitly_hover_card">Apple Inc.</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TVPQL" data-bitly-type="bitly_hover_card">VMware</a></td>
<td>Not Affected</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWHXX" data-bitly-type="bitly_hover_card">Debian GNU/Linux</a></td>
<td>Unknown</td>
</tr>
<tr>
<td><a title="View Vendor Information" href="http://www.kb.cert.org/vuls/id/MAPG-8TWPX7" data-bitly-type="bitly_hover_card">Fedora Project</a></td>
<td>Unknown</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Interxect Services advises customers to update your systems with vendor approved patches as they become available.</p>
<p>Original article: <a href="https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/" rel="bookmark" title="Permanent link to 'CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks'">CERT-US Advises that 64-bit OSs and virtualization software on Intel 64 chips are vulnerable to hacks</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/cert-us-advises-that-64-bit-oss-and-virtualization-software-on-intel-64-chips-are-vulnerable-to-hacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">292</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 28/50 queries in 0.032 seconds using Disk (Request-wide modification query)

Served from: www.interxect.com @ 2025-06-13 08:35:19 by W3 Total Cache
-->