CVE-2012-0045

Published Jul 3, 2012

Last updated 2 years ago

Overview

Description
The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.
Source
secalert@redhat.com
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
4.7
Impact score
6.9
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:N/I:N/A:C

Weaknesses

nvd@nist.gov
NVD-CWE-Other

Configurations