7.6 High
AI Score
Confidence
Low
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
36.6%
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
CPE | Name | Operator | Version |
---|---|---|---|
eos | eq | 4.15 | |
eos | eq | 4.14 | |
eos | eq | 4.13 | |
eos | eq | 4.12 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 7.0 | |
emc_px12-400r_ivx | lt | 1.0.10.33264 | |
emc_px12-450r_ivx | lt | 1.0.10.33264 | |
linux_kernel | le | 2.6.32 | |
qemu | le | 2.3.0 |
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee73f656a604d5aa9df86a97102e4e462dd79924
mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33
rhn.redhat.com/errata/RHSA-2015-1507.html
rhn.redhat.com/errata/RHSA-2015-1508.html
rhn.redhat.com/errata/RHSA-2015-1512.html
www.debian.org/security/2015/dsa-3348
www.openwall.com/lists/oss-security/2015/06/25/7
www.securityfocus.com/bid/75273
www.securitytracker.com/id/1032598
bugzilla.redhat.com/show_bug.cgi?id=1229640
github.com/torvalds/linux/commit/ee73f656a604d5aa9df86a97102e4e462dd79924
security.gentoo.org/glsa/201510-02
support.lenovo.com/product_security/qemu
support.lenovo.com/us/en/product_security/qemu
www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
www.exploit-db.com/exploits/37990/
www.mail-archive.com/qemu-devel%40nongnu.org/msg304138.html