Lucene search

K
cve[email protected]CVE-2012-0045
HistoryJul 03, 2012 - 4:40 p.m.

CVE-2012-0045

2012-07-0316:40:31
web.nvd.nist.gov
52
cve-2012-0045
linux kernel
kvm
syscall
nasm
denial of service

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.3%

The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.2.13
OR
linuxlinux_kernelMatch3.0rc1
OR
linuxlinux_kernelMatch3.0rc2
OR
linuxlinux_kernelMatch3.0rc3
OR
linuxlinux_kernelMatch3.0rc4
OR
linuxlinux_kernelMatch3.0rc5
OR
linuxlinux_kernelMatch3.0rc6
OR
linuxlinux_kernelMatch3.0rc7
OR
linuxlinux_kernelMatch3.0.1
OR
linuxlinux_kernelMatch3.0.2
OR
linuxlinux_kernelMatch3.0.3
OR
linuxlinux_kernelMatch3.0.4
OR
linuxlinux_kernelMatch3.0.5
OR
linuxlinux_kernelMatch3.0.6
OR
linuxlinux_kernelMatch3.0.7
OR
linuxlinux_kernelMatch3.0.8
OR
linuxlinux_kernelMatch3.0.9
OR
linuxlinux_kernelMatch3.0.10
OR
linuxlinux_kernelMatch3.0.11
OR
linuxlinux_kernelMatch3.0.12
OR
linuxlinux_kernelMatch3.0.13
OR
linuxlinux_kernelMatch3.0.14
OR
linuxlinux_kernelMatch3.0.15
OR
linuxlinux_kernelMatch3.0.16
OR
linuxlinux_kernelMatch3.0.17
OR
linuxlinux_kernelMatch3.0.18
OR
linuxlinux_kernelMatch3.0.19
OR
linuxlinux_kernelMatch3.0.20
OR
linuxlinux_kernelMatch3.0.21
OR
linuxlinux_kernelMatch3.0.22
OR
linuxlinux_kernelMatch3.0.23
OR
linuxlinux_kernelMatch3.0.24
OR
linuxlinux_kernelMatch3.0.25
OR
linuxlinux_kernelMatch3.0.26
OR
linuxlinux_kernelMatch3.0.27
OR
linuxlinux_kernelMatch3.0.28
OR
linuxlinux_kernelMatch3.0.29
OR
linuxlinux_kernelMatch3.0.30
OR
linuxlinux_kernelMatch3.0.31
OR
linuxlinux_kernelMatch3.0.32
OR
linuxlinux_kernelMatch3.0.33
OR
linuxlinux_kernelMatch3.0.34
OR
linuxlinux_kernelMatch3.1
OR
linuxlinux_kernelMatch3.1rc1
OR
linuxlinux_kernelMatch3.1rc2
OR
linuxlinux_kernelMatch3.1rc3
OR
linuxlinux_kernelMatch3.1rc4
OR
linuxlinux_kernelMatch3.1.1
OR
linuxlinux_kernelMatch3.1.2
OR
linuxlinux_kernelMatch3.1.3
OR
linuxlinux_kernelMatch3.1.4
OR
linuxlinux_kernelMatch3.1.5
OR
linuxlinux_kernelMatch3.1.6
OR
linuxlinux_kernelMatch3.1.7
OR
linuxlinux_kernelMatch3.1.8
OR
linuxlinux_kernelMatch3.1.9
OR
linuxlinux_kernelMatch3.1.10
OR
linuxlinux_kernelMatch3.2
OR
linuxlinux_kernelMatch3.2.1
OR
linuxlinux_kernelMatch3.2.2
OR
linuxlinux_kernelMatch3.2.3
OR
linuxlinux_kernelMatch3.2.4
OR
linuxlinux_kernelMatch3.2.5
OR
linuxlinux_kernelMatch3.2.6
OR
linuxlinux_kernelMatch3.2.7
OR
linuxlinux_kernelMatch3.2.8
OR
linuxlinux_kernelMatch3.2.9
OR
linuxlinux_kernelMatch3.2.10
OR
linuxlinux_kernelMatch3.2.11
OR
linuxlinux_kernelMatch3.2.12

4.7 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:N/A:C

5.8 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

56.3%