Vulnerability Details : CVE-2015-3215
The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2015-3215
- cpe:2.3:a:redhat:virtio-win:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3215
1.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3215
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2015-3215
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3215
-
http://rhn.redhat.com/errata/RHSA-2015-1043.html
RHSA-2015:1043 - Security Advisory - Red Hat Customer PortalVendor Advisory
-
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/fbfa4d1083ea84c5429992ca3e996d7d4fbc8238
NetKVM: BZ#1169718: More rigoruous testing of incoming packet · YanVugenfirer/kvm-guest-drivers-windows@fbfa4d1 · GitHubPatch;Third Party Advisory
-
https://www.redhat.com/security/data/cve/CVE-2015-3215.html
CVE-2015-3215 - Red Hat Customer PortalVendor Advisory
-
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/723416fa4210b7464b28eab89cc76252e6193ac1
NetKVM: BZ#1169718: Checking the length only on read · YanVugenfirer/kvm-guest-drivers-windows@723416f · GitHubPatch;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-1044.html
RHSA-2015:1044 - Security Advisory - Red Hat Customer PortalVendor Advisory
Jump to