Vulnerability Details : CVE-2016-3044
The Linux kernel component in IBM PowerKVM 2.1 before 2.1.1.3-65.10 and 3.1 before 3.1.0.2 allows guest OS users to cause a denial of service (host OS infinite loop and hang) via unspecified vectors.
Vulnerability category: Input validationBypassGain privilegeDenial of service
Products affected by CVE-2016-3044
- cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:2.1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:2.1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:3.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:2.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:powerkvm:2.1.1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3044
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3044
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
2.0
|
4.0
|
NIST |
CWE ids for CVE-2016-3044
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3044
-
http://rhn.redhat.com/errata/RHSA-2016-2574.html
RHSA-2016:2574 - Security Advisory - Red Hat Customer Portal
-
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023969
IBM Security Bulletin: A vulnerability in the Linux kernel affects PowerKVM (CVE-2016-3044)Vendor Advisory
-
http://www.securityfocus.com/bid/92123
Linux Kernel KVM CVE-2016-3044 Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2016-1033.html
RHSA-2016:1033 - Security Advisory - Red Hat Customer Portal
Jump to