CVE-2016-3713

Published Jun 27, 2016

Last updated 8 years ago

Overview

Description
The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.
Source
secalert@redhat.com
NVD status
Analyzed

Social media

Hype score
Not currently trending

Risk scores

CVSS 3.0

Type
Primary
Base score
7.1
Impact score
5.2
Exploitability score
1.8
Vector string
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
5.6
Impact score
7.8
Exploitability score
3.9
Vector string
AV:L/AC:L/Au:N/C:P/I:N/A:C

Weaknesses

nvd@nist.gov
CWE-284

Configurations