Lucene search

K
cveMitreCVE-2017-8106
HistoryApr 24, 2017 - 11:59 p.m.

CVE-2017-8106

2017-04-2423:59:00
CWE-476
mitre
web.nvd.nist.gov
46
linux kernel
cve-2017-8106
handle_invept
kvm
denial of service
nvd
security vulnerability

CVSS2

4.9

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5

Confidence

High

EPSS

0

Percentile

12.6%

The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.

Affected configurations

Nvd
Node
linuxlinux_kernelMatch3.12
OR
linuxlinux_kernelMatch3.12.1
OR
linuxlinux_kernelMatch3.12.2
OR
linuxlinux_kernelMatch3.12.3
OR
linuxlinux_kernelMatch3.12.4
OR
linuxlinux_kernelMatch3.12.5
OR
linuxlinux_kernelMatch3.12.6
OR
linuxlinux_kernelMatch3.12.7
OR
linuxlinux_kernelMatch3.12.8
OR
linuxlinux_kernelMatch3.12.9
OR
linuxlinux_kernelMatch3.12.10
OR
linuxlinux_kernelMatch3.12.11
OR
linuxlinux_kernelMatch3.12.12
OR
linuxlinux_kernelMatch3.12.13
OR
linuxlinux_kernelMatch3.12.14
OR
linuxlinux_kernelMatch3.12.15
OR
linuxlinux_kernelMatch3.12.16
OR
linuxlinux_kernelMatch3.12.17
OR
linuxlinux_kernelMatch3.12.18
OR
linuxlinux_kernelMatch3.12.19
OR
linuxlinux_kernelMatch3.12.20
OR
linuxlinux_kernelMatch3.12.21
OR
linuxlinux_kernelMatch3.12.22
OR
linuxlinux_kernelMatch3.12.23
OR
linuxlinux_kernelMatch3.12.24
OR
linuxlinux_kernelMatch3.12.25
OR
linuxlinux_kernelMatch3.12.26
OR
linuxlinux_kernelMatch3.12.27
OR
linuxlinux_kernelMatch3.12.28
OR
linuxlinux_kernelMatch3.12.29
OR
linuxlinux_kernelMatch3.12.30
OR
linuxlinux_kernelMatch3.12.31
OR
linuxlinux_kernelMatch3.12.32
OR
linuxlinux_kernelMatch3.12.33
OR
linuxlinux_kernelMatch3.12.34
OR
linuxlinux_kernelMatch3.12.35
OR
linuxlinux_kernelMatch3.12.36
OR
linuxlinux_kernelMatch3.12.37
OR
linuxlinux_kernelMatch3.12.38
OR
linuxlinux_kernelMatch3.12.39
OR
linuxlinux_kernelMatch3.12.40
OR
linuxlinux_kernelMatch3.12.41
OR
linuxlinux_kernelMatch3.12.42
OR
linuxlinux_kernelMatch3.12.43
OR
linuxlinux_kernelMatch3.12.44
OR
linuxlinux_kernelMatch3.12.45
OR
linuxlinux_kernelMatch3.12.46
OR
linuxlinux_kernelMatch3.12.47
OR
linuxlinux_kernelMatch3.12.48
OR
linuxlinux_kernelMatch3.12.49
OR
linuxlinux_kernelMatch3.12.50
OR
linuxlinux_kernelMatch3.12.51
OR
linuxlinux_kernelMatch3.12.52
OR
linuxlinux_kernelMatch3.12.53
OR
linuxlinux_kernelMatch3.12.54
OR
linuxlinux_kernelMatch3.12.55
OR
linuxlinux_kernelMatch3.12.56
OR
linuxlinux_kernelMatch3.12.57
OR
linuxlinux_kernelMatch3.12.58
OR
linuxlinux_kernelMatch3.12.59
OR
linuxlinux_kernelMatch3.13
OR
linuxlinux_kernelMatch3.14.67
OR
linuxlinux_kernelMatch3.14.68
OR
linuxlinux_kernelMatch3.15
VendorProductVersionCPE
linuxlinux_kernel3.12cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*
linuxlinux_kernel3.12.1cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*
linuxlinux_kernel3.12.2cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*
linuxlinux_kernel3.12.3cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*
linuxlinux_kernel3.12.4cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*
linuxlinux_kernel3.12.5cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*
linuxlinux_kernel3.12.6cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*
linuxlinux_kernel3.12.7cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*
linuxlinux_kernel3.12.8cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*
linuxlinux_kernel3.12.9cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 641

CVSS2

4.9

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5

Confidence

High

EPSS

0

Percentile

12.6%