mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
441 lines
17 KiB
JSON
441 lines
17 KiB
JSON
{
|
|
"id": "CVE-2017-8106",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2017-04-24T23:59:00.753",
|
|
"lastModified": "2024-11-21T03:33:20.220",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La funci\u00f3n handle_invept de arch/x86/kvm/vmx.c del Kernel de Linux, versiones 3.12 a 3.15, permite a los usuarios privilegiados del sistema operativo hu\u00e9sped de KVM causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del sistema operativo anfitri\u00f3n) a trav\u00e9s de una instrucci\u00f3n single-context INVEPT con puntero EPT nulo."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 5.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.8,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
|
|
"baseScore": 4.9,
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "COMPLETE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 6.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-476"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7C9A32A2-C1EC-4463-B21F-79E6592C5339"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD8683B9-63EF-43D0-8E4F-2909429B47E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91F6A187-E8B1-47CF-B375-FB453F8000F2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97A4332E-E1D4-4B6E-B9FE-B33CCF083402"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1949D7D6-7DD2-458B-89D3-B0090C8E9984"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BA23201B-8DC1-4694-8DD9-661BC78F152A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDDB83D1-8A25-495E-BC27-0E2059255DEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5BF8D075-08F5-4CF4-8416-9963CA6B04D3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E4ED579-E7D9-434A-A357-3D9056784227"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79E9D537-1F1A-462B-A6D6-2DC4FF07A843"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B2AEF20-1F50-497D-AD1E-AC0ED7699DDE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "93A7B9D2-EF81-4952-AD6F-C5870331F17E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1BACD07E-51D7-4081-89E0-276FE3ADCEAE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D46AEA84-FDC3-41A3-9F63-D38290C9862F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "54C401E0-6258-4F25-82CF-B81B7624C509"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0810E4B6-1510-46A6-9519-127E226BDE01"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B7BA4A7A-FF32-4763-8278-08C2DEBAA05A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B3E44C3-41FC-41A1-9ACF-1DD00DE06CFC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "860169C6-3AF9-4F00-869C-DE0DE289DF91"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51398597-A993-496F-84E4-993B74AC0508"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9879AED-F53E-47D7-ACA1-E61EBF3133EB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "048698BF-3B0C-449C-9D2A-81B5CAB4A27F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D4EED7A3-B40C-4C02-80B7-1836A3C4C2A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4B72AFA7-C594-4BCF-BB79-F3EE675766A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5195ED19-4482-435C-9224-20B0EDF6F114"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D6AC043B-EACB-406C-B4D0-7B22CF8B0EEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FEA5C700-05F9-4077-ACE6-8A7EE033B464"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BE74D9A2-DCD6-4E14-B061-972EB7CF1EE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E50006B4-3AB0-4FF2-9111-F0E1191D243C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B654475F-4C5F-485E-BB77-CFEF6D214C75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A4304FA-0868-4A81-B6E4-FBDF84B153AB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2100C16C-437E-4EEC-BD04-D75CF3D02333"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4EF474B9-2740-498C-909B-DBFD3FDC23CC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88F0A015-6CF7-4528-9CF9-E0E76CB3E1D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "09723483-B241-4D82-862C-AA0098F680CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A084853B-91CB-4964-A498-9B4208152138"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A19BA782-DCFB-48B6-973C-3AD050ED51F3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F87E856E-AD83-4EBF-BD06-4736B9116083"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "04D914E1-7229-4642-BDC9-5A8261E03538"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BFDC2E5D-EF73-4DED-8E4C-8309BA53A092"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9406CC5F-6D28-4836-BDD4-A50674F1333D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "124ADC63-CDA6-4A27-A844-4F33DB6A4031"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "40FD9974-27BC-4DE4-9CB0-FC2D0CAA1D46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "72559629-4BB1-4651-BEF7-B6E74683C401"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8648EF03-5B27-40BD-90A0-59DC8120440B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C26111E-EF43-4CFA-977E-6658A7B62C27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "06A8E46E-7CAB-49E2-A1DD-F146FBBBA19E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7799F2BF-9C85-444A-970A-6F245463425F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91854A06-32BC-4C9F-AA63-BA32F2B385DE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "33509600-67E3-4C78-B0C4-4D62D70FCD94"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "10237625-21BB-43A0-A7A2-EE662703391E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "11E6E8FD-CAA5-4A93-ABD5-815B51D7DE9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3C3B5CB0-C094-471A-A6D5-2FBC91384FDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B77FCA1E-99B4-4D10-9A59-65FE265C9DBA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50513044-C297-4D5E-BD45-6FD603A29F25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E4CB47E3-1DF7-4FB1-A436-F7648C8F0EEC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F48C8632-E8C5-4907-AEDC-1B33D8A5AF04"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F5827B65-9941-4927-8D47-57229EEA290F"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Issue Tracking"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://launchpad.net/bugs/1678676",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Issue Tracking"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Issue Tracking"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://launchpad.net/bugs/1678676",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Issue Tracking"
|
|
]
|
|
}
|
|
]
|
|
} |