Lucene search

K
ubuntuUbuntuUSN-776-1
HistoryMay 12, 2009 - 12:00 a.m.

KVM vulnerabilities

2009-05-1200:00:00
ubuntu.com
49

7.5 High

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.085 Low

EPSS

Percentile

94.4%

Releases

  • Ubuntu 8.10
  • Ubuntu 8.04

Packages

  • kvm -

Details

Avi Kivity discovered that KVM did not correctly handle certain disk
formats. A local attacker could attach a malicious partition that
would allow the guest VM to read files on the VM host. (CVE-2008-1945,
CVE-2008-2004)

Alfredo Ortega discovered that KVM’s VNC protocol handler did not
correctly validate certain messages. A remote attacker could send
specially crafted VNC messages that would cause KVM to consume CPU
resources, leading to a denial of service. (CVE-2008-2382)

Jan Niehusmann discovered that KVM’s Cirrus VGA implementation over VNC
did not correctly handle certain bitblt operations. A local attacker
could exploit this flaw to potentially execute arbitrary code on the VM
host or crash KVM, leading to a denial of service. (CVE-2008-4539)

It was discovered that KVM’s VNC password checks did not use the correct
length. A remote attacker could exploit this flaw to cause KVM to crash,
leading to a denial of service. (CVE-2008-5714)

OSVersionArchitecturePackageVersionFilename
Ubuntu8.10noarchkvm< 1:72+dfsg-1ubuntu6.1UNKNOWN
Ubuntu8.04noarchkvm< 1:62+dfsg-0ubuntu8.1UNKNOWN

7.5 High

AI Score

Confidence

Low

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.085 Low

EPSS

Percentile

94.4%