Lucene search

K
freebsdFreeBSDE73C688B-F7E6-11EA-88F8-901B0EF719AB
HistorySep 15, 2020 - 12:00 a.m.

FreeBSD -- bhyve SVM guest escape

2020-09-1500:00:00
vuxml.freebsd.org
14

7.6 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

29.6%

Problem Description:
A number of AMD virtualization instructions operate on host physical
addresses, are not subject to nested page table translation, and guest use of
these instructions was not trapped.
Impact:
From kernel mode a malicious guest can write to arbitrary host memory (with
some constraints), affording the guest full control of the host.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd-kernel= 12.1UNKNOWN
FreeBSDanynoarchfreebsd-kernel< 12.1_10UNKNOWN

7.6 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

29.6%

Related for E73C688B-F7E6-11EA-88F8-901B0EF719AB