4.1
CVSSv2

CVE-2010-0306

Published: 12/02/2010 Updated: 19/09/2017
CVSS v2 Base Score: 4.1 | Impact Score: 6.4 | Exploitability Score: 2.7
VMScore: 365
Vector: AV:L/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) to restrict instruction execution, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, and replacing an instruction in between emulator entry and instruction fetch, a related issue to CVE-2010-0298.

Vulnerable Product Search on Vulmon Subscribe to Product

kvm qumranet kvm 83

Vendor Advisories

Synopsis Important: kvm security and bug fix update Type/Severity Security Advisory: Important Topic Updated kvm packages that fix multiple security issues and several bugs arenow available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security R ...
Several local vulnerabilities have been discovered in kvm, a full virtualization system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-0298 CVE-2010-0306 Gleb Natapov discovered issues in the KVM subsystem where missing permission checks (CPL/IOPL) permit a user in a guest system to de ...
KVM regressed under some conditions in the Linux kernel ...