Vulnerability Details : CVE-2010-0306
The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) to restrict instruction execution, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, and replacing an instruction in between emulator entry and instruction fetch, a related issue to CVE-2010-0298.
Vulnerability category: Denial of service
Products affected by CVE-2010-0306
- cpe:2.3:a:kvm_qumranet:kvm:83:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0306
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0306
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.1
|
MEDIUM | AV:L/AC:M/Au:S/C:P/I:P/A:P |
2.7
|
6.4
|
NIST |
CWE ids for CVE-2010-0306
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0306
-
https://rhn.redhat.com/errata/RHSA-2010-0088.html
RHSA-2010:0088 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=560654
560654 – (CVE-2010-0306) CVE-2010-0306 kvm: emulator privilege escalation IOPL/CPL level check
-
http://www.debian.org/security/2010/dsa-1996
Debian -- Security Information -- DSA-1996-1 linux-2.6
-
https://rhn.redhat.com/errata/RHSA-2010-0095.html
RHSA-2010:0095 - Security Advisory - Red Hat Customer Portal
-
http://www.securityfocus.com/bid/38158
Linux Kernel KVM Multiple Privilege Escalation and Denial of Service Vulnerabilities
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10953
Repository / Oval Repository
-
http://secunia.com/advisories/38499
Sign inVendor Advisory
-
http://secunia.com/advisories/38492
Sign inVendor Advisory
Jump to