4.4
CVSSv2

CVE-2010-0419

Published: 05/03/2010 Updated: 19/09/2017
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not properly restrict writing of segment selectors to segment registers, which might allow guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, and replacing an instruction in between emulator entry and instruction fetch.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kvm qumranet kvm 83

Vendor Advisories

Synopsis Important: kvm security and bug fix update Type/Severity Security Advisory: Important Topic Updated kvm packages that fix two security issues and two bugs are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response T ...
Several local vulnerabilities have been discovered in kvm, a full virtualization system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-0298 CVE-2010-0306 Gleb Natapov discovered issues in the KVM subsystem where missing permission checks (CPL/IOPL) permit a user in a guest system to de ...
KVM regressed under some conditions in the Linux kernel ...