[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-1797Date: (C)2013-03-22   (M)2024-03-08


Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 6.8
Exploit Score: 3.2
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
MDVSA-2013:176
RHSA-2013:0727
RHSA-2013:0744
RHSA-2013:0746
RHSA-2013:0928
RHSA-2013:1026
USN-1809-1
USN-1812-1
USN-1813-1
http://www.openwall.com/lists/oss-security/2013/03/20/9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b79459b482e85cb7426aa7da683a9f2c97aeae1
https://bugzilla.redhat.com/show_bug.cgi?id=917013
https://github.com/torvalds/linux/commit/0b79459b482e85cb7426aa7da683a9f2c97aeae1
openSUSE-SU-2013:0847
openSUSE-SU-2013:0925
openSUSE-SU-2013:1187

CWE    1
CWE-399
OVAL    34
oval:org.secpod.oval:def:106164
oval:org.secpod.oval:def:106120
oval:org.secpod.oval:def:701271
oval:org.secpod.oval:def:106085
...

© SecPod Technologies