6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
38.2%
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
rhn.redhat.com/errata/RHSA-2015-1507.html
rhn.redhat.com/errata/RHSA-2015-1508.html
rhn.redhat.com/errata/RHSA-2015-1512.html
www.debian.org/security/2015/dsa-3348
www.openwall.com/lists/oss-security/2015/06/25/7
www.securityfocus.com/bid/75273
www.securitytracker.com/id/1032598
bugzilla.redhat.com/show_bug.cgi?id=1229640
github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
security.gentoo.org/glsa/201510-02
support.lenovo.com/product_security/qemu
support.lenovo.com/us/en/product_security/qemu
www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
www.exploit-db.com/exploits/37990/
www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.html