### [CVE-2013-1797](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation. ### POC #### Reference - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 #### Github No PoCs found on GitHub currently.