Vulnerability Details : CVE-2010-0419
The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not properly restrict writing of segment selectors to segment registers, which might allow guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, and replacing an instruction in between emulator entry and instruction fetch.
Vulnerability category: Denial of service
Products affected by CVE-2010-0419
- cpe:2.3:a:kvm_qumranet:kvm:83:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0419
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0419
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2010-0419
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0419
-
http://securitytracker.com/id?1023663
KVM x86 Emulator Flaw Lets Local Users Gain Elevated Privileges on the Guest Operating System - SecurityTracker
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10139
Repository / Oval Repository
-
http://www.securityfocus.com/bid/38467
Linux Kernel KVM Segment Selector Loading Local Privilege Escalation Vulnerability
-
http://www.redhat.com/support/errata/RHSA-2010-0126.html
Support
-
https://bugzilla.redhat.com/show_bug.cgi?id=563463
563463 – (CVE-2010-0419) CVE-2010-0419 kvm: emulator privilege escalation segment selector check
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/56662
Linux Kernel segment selectors privilege escalation CVE-2010-0419 Vulnerability Report
Jump to