CVE-2015-8104
Published Nov 16, 2015
Last updated a year ago
Overview
- Description
- The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.7
- Impact score
- 6.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF948E6A-07BE-4C7D-8A98-002E89D35F4D" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0E23B94-1726-4F63-84BB-8D83FAB156D7" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C76124AB-4E3D-4BE0-AAEA-7FC05868E2FB" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F30B5EF5-0AE8-420B-A103-B1B25A372F09" }, { "criteria": "cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F784EF07-DBEC-492A-A0F4-F9F7B2551A0B" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1044792C-D544-457C-9391-4F3B5BAB978D" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBD9AD01-50B7-4951-8A73-A6CF4801A487" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89AA8FD5-E997-4F0D-AFB6-FFBE0073BA5D" }, { "criteria": "cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75615D84-9CA1-456C-816D-768E37B074A4" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90CCECD0-C0F9-45A8-8699-64428637EBCA" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0ED340C-6746-471E-9F2D-19D62D224B7A" }, { "criteria": "cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99BD7C4F-DE4C-4508-B20D-46A94B616C5B" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4B6F7CE9-C409-4D88-9A99-B21420633F45" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B814C381-4991-495A-B530-7543F977B346" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FE1F484-23B4-4CCC-AD23-6F8BDC312CE8" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBB7BAFE-9CB4-40D2-908C-55307728116F" }, { "criteria": "cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AD42E21-EA9E-41EB-AC7E-478CCEEEBA8D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79A602C5-61FE-47BA-9786-F045B6C6DBA8" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A480976-A583-4A03-A2C6-5F35F9C27D70", "versionEndIncluding": "4.0.34", "versionStartIncluding": "4.0.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1F3632E-CE76-4C29-8F43-383EB819C008", "versionEndIncluding": "4.1.42", "versionStartIncluding": "4.1.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "431E3B20-2ED2-42A8-93E2-F8404CB5D434", "versionEndIncluding": "4.2.34", "versionStartIncluding": "4.2.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36654E81-CCF3-4E1F-BAEB-09F26BD7866C", "versionEndIncluding": "4.3.35", "versionStartIncluding": "4.3.0" }, { "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA344833-47A9-4AC4-B0AA-7A0F58B40C0C", "versionEndIncluding": "5.0.13", "versionStartIncluding": "5.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F1B9081-FA4D-426C-B2DE-78AEA0BB6DB1", "versionEndIncluding": "4.2.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA" }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B" } ], "operator": "OR" } ] } ]