7.1 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
6.9 Medium
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
68.3%
The azx_position_ok function in hda_intel.c in Linux kernel 2.6.33-rc4 and earlier, when running on the AMD780V chip set, allows context-dependent attackers to cause a denial of service (crash) via unknown manipulations that trigger a divide-by-zero error.
CPE | Name | Operator | Version |
---|---|---|---|
linux:linux_kernel | linux linux kernel | lt | 2.6.33 |
lkml.org/lkml/2010/2/5/322
nctritech.net/bugreport.txt
secunia.com/advisories/39649
secunia.com/advisories/43315
support.avaya.com/css/P8/documents/100088287
support.avaya.com/css/P8/documents/100090459
www.openwall.com/lists/oss-security/2010/02/22/2
www.redhat.com/support/errata/RHSA-2010-0394.html
www.redhat.com/support/errata/RHSA-2010-0398.html
www.securityfocus.com/archive/1/516397/100/0/threaded
www.securityfocus.com/bid/38348
www.vmware.com/security/advisories/VMSA-2011-0003.html
bugzilla.redhat.com/show_bug.cgi?id=567168
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10027
More