4.7

CVE-2012-0045

Exploit

The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 3.2.13
LinuxLinux Kernel Version3.0 Updaterc1
LinuxLinux Kernel Version3.0 Updaterc2
LinuxLinux Kernel Version3.0 Updaterc3
LinuxLinux Kernel Version3.0 Updaterc4
LinuxLinux Kernel Version3.0 Updaterc5
LinuxLinux Kernel Version3.0 Updaterc6
LinuxLinux Kernel Version3.0 Updaterc7
LinuxLinux Kernel Version3.0.1
LinuxLinux Kernel Version3.0.2
LinuxLinux Kernel Version3.0.3
LinuxLinux Kernel Version3.0.4
LinuxLinux Kernel Version3.0.5
LinuxLinux Kernel Version3.0.6
LinuxLinux Kernel Version3.0.7
LinuxLinux Kernel Version3.0.8
LinuxLinux Kernel Version3.0.9
LinuxLinux Kernel Version3.0.10
LinuxLinux Kernel Version3.0.11
LinuxLinux Kernel Version3.0.12
LinuxLinux Kernel Version3.0.13
LinuxLinux Kernel Version3.0.14
LinuxLinux Kernel Version3.0.15
LinuxLinux Kernel Version3.0.16
LinuxLinux Kernel Version3.0.17
LinuxLinux Kernel Version3.0.18
LinuxLinux Kernel Version3.0.19
LinuxLinux Kernel Version3.0.20
LinuxLinux Kernel Version3.0.21
LinuxLinux Kernel Version3.0.22
LinuxLinux Kernel Version3.0.23
LinuxLinux Kernel Version3.0.24
LinuxLinux Kernel Version3.0.25
LinuxLinux Kernel Version3.0.26
LinuxLinux Kernel Version3.0.27
LinuxLinux Kernel Version3.0.28
LinuxLinux Kernel Version3.0.29
LinuxLinux Kernel Version3.0.30
LinuxLinux Kernel Version3.0.31
LinuxLinux Kernel Version3.0.32
LinuxLinux Kernel Version3.0.33
LinuxLinux Kernel Version3.0.34
LinuxLinux Kernel Version3.1
LinuxLinux Kernel Version3.1 Updaterc1
LinuxLinux Kernel Version3.1 Updaterc2
LinuxLinux Kernel Version3.1 Updaterc3
LinuxLinux Kernel Version3.1 Updaterc4
LinuxLinux Kernel Version3.1.1
LinuxLinux Kernel Version3.1.2
LinuxLinux Kernel Version3.1.3
LinuxLinux Kernel Version3.1.4
LinuxLinux Kernel Version3.1.5
LinuxLinux Kernel Version3.1.6
LinuxLinux Kernel Version3.1.7
LinuxLinux Kernel Version3.1.8
LinuxLinux Kernel Version3.1.9
LinuxLinux Kernel Version3.1.10
LinuxLinux Kernel Version3.2
LinuxLinux Kernel Version3.2.1
LinuxLinux Kernel Version3.2.2
LinuxLinux Kernel Version3.2.3
LinuxLinux Kernel Version3.2.4
LinuxLinux Kernel Version3.2.5
LinuxLinux Kernel Version3.2.6
LinuxLinux Kernel Version3.2.7
LinuxLinux Kernel Version3.2.8
LinuxLinux Kernel Version3.2.9
LinuxLinux Kernel Version3.2.10
LinuxLinux Kernel Version3.2.11
LinuxLinux Kernel Version3.2.12
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.56% 0.673
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 3.4 6.9
AV:L/AC:M/Au:N/C:N/I:N/A:C