4.7
CVSSv2

CVE-2012-0045

Published: 03/07/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
VMScore: 475
Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel prior to 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.0.25

linux linux kernel 3.1.2

linux linux kernel 3.0

linux linux kernel 3.0.22

linux linux kernel 3.0.5

linux linux kernel 3.1

linux linux kernel 3.2.5

linux linux kernel 3.0.18

linux linux kernel 3.0.6

linux linux kernel 3.0.11

linux linux kernel 3.0.34

linux linux kernel 3.0.32

linux linux kernel 3.0.19

linux linux kernel 3.0.4

linux linux kernel 3.0.27

linux linux kernel 3.2.11

linux linux kernel 3.0.23

linux linux kernel 3.2.10

linux linux kernel 3.0.8

linux linux kernel 3.0.33

linux linux kernel 3.0.28

linux linux kernel 3.2.4

linux linux kernel 3.0.13

linux linux kernel 3.2.9

linux linux kernel 3.0.10

linux linux kernel 3.0.1

linux linux kernel 3.1.6

linux linux kernel 3.2.6

linux linux kernel 3.2.2

linux linux kernel 3.0.17

linux linux kernel 3.1.3

linux linux kernel 3.1.9

linux linux kernel 3.0.16

linux linux kernel 3.0.21

linux linux kernel 3.0.7

linux linux kernel 3.1.5

linux linux kernel 3.1.8

linux linux kernel 3.2.1

linux linux kernel 3.2.7

linux linux kernel 3.0.20

linux linux kernel 3.0.24

linux linux kernel 3.0.15

linux linux kernel 3.0.2

linux linux kernel 3.1.7

linux linux kernel 3.1.1

linux linux kernel 3.0.12

linux linux kernel

linux linux kernel 3.2.8

linux linux kernel 3.1.10

linux linux kernel 3.2

linux linux kernel 3.0.3

linux linux kernel 3.0.9

linux linux kernel 3.0.26

linux linux kernel 3.1.4

linux linux kernel 3.0.30

linux linux kernel 3.0.31

linux linux kernel 3.0.29

linux linux kernel 3.2.12

linux linux kernel 3.0.14

linux linux kernel 3.2.3

Vendor Advisories

Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix various security issues and several bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity ...
Synopsis Moderate: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Moderate Topic An updated rhev-hypervisor6 package that fixes two security issues and onebug is now availableThe Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vu ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4307 Nageswara R Sastry reported an issue in the ext4 filesystem Local users with the privileges to mount a filesystem c ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
A buffer overflow flaw was found in the way the Linux kernel's XFS file system implementation handled links with overly long path names A local, unprivileged user could use this flaw to cause a denial of service or escalate their privileges by mounting a specially-crafted disk (CVE-2011-4077, Moderate) Flaws in ghash_update() and ghash_final() co ...

Exploits

source: wwwsecurityfocuscom/bid/51389/info The Linux kernel is prone to a local denial-of-service vulnerability Attackers can exploit this issue to cause the kernel to crash, denying service to legitimate users NOTE: This issue affects Linux kernels running as guest images [bits 32] global _start SECTION text _start: syscall ...