5.2

CVE-2013-0216

Exploit

The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version <= 3.7.8
LinuxLinux Kernel Version3.0 Updaterc1
LinuxLinux Kernel Version3.0 Updaterc2
LinuxLinux Kernel Version3.0 Updaterc3
LinuxLinux Kernel Version3.0 Updaterc4
LinuxLinux Kernel Version3.0 Updaterc5
LinuxLinux Kernel Version3.0 Updaterc6
LinuxLinux Kernel Version3.0 Updaterc7
LinuxLinux Kernel Version3.0.1
LinuxLinux Kernel Version3.0.2
LinuxLinux Kernel Version3.0.3
LinuxLinux Kernel Version3.0.4
LinuxLinux Kernel Version3.0.5
LinuxLinux Kernel Version3.0.6
LinuxLinux Kernel Version3.0.7
LinuxLinux Kernel Version3.0.8
LinuxLinux Kernel Version3.0.9
LinuxLinux Kernel Version3.0.10
LinuxLinux Kernel Version3.0.11
LinuxLinux Kernel Version3.0.12
LinuxLinux Kernel Version3.0.13
LinuxLinux Kernel Version3.0.14
LinuxLinux Kernel Version3.0.15
LinuxLinux Kernel Version3.0.16
LinuxLinux Kernel Version3.0.17
LinuxLinux Kernel Version3.0.18
LinuxLinux Kernel Version3.0.19
LinuxLinux Kernel Version3.0.20
LinuxLinux Kernel Version3.0.21
LinuxLinux Kernel Version3.0.22
LinuxLinux Kernel Version3.0.23
LinuxLinux Kernel Version3.0.24
LinuxLinux Kernel Version3.0.25
LinuxLinux Kernel Version3.0.26
LinuxLinux Kernel Version3.0.27
LinuxLinux Kernel Version3.0.28
LinuxLinux Kernel Version3.0.29
LinuxLinux Kernel Version3.0.30
LinuxLinux Kernel Version3.0.31
LinuxLinux Kernel Version3.0.32
LinuxLinux Kernel Version3.0.33
LinuxLinux Kernel Version3.0.34
LinuxLinux Kernel Version3.0.35
LinuxLinux Kernel Version3.0.36
LinuxLinux Kernel Version3.0.37
LinuxLinux Kernel Version3.0.38
LinuxLinux Kernel Version3.0.39
LinuxLinux Kernel Version3.0.40
LinuxLinux Kernel Version3.0.41
LinuxLinux Kernel Version3.0.42
LinuxLinux Kernel Version3.0.43
LinuxLinux Kernel Version3.0.44
LinuxLinux Kernel Version3.1
LinuxLinux Kernel Version3.1 Updaterc1
LinuxLinux Kernel Version3.1 Updaterc2
LinuxLinux Kernel Version3.1 Updaterc3
LinuxLinux Kernel Version3.1 Updaterc4
LinuxLinux Kernel Version3.1.1
LinuxLinux Kernel Version3.1.2
LinuxLinux Kernel Version3.1.3
LinuxLinux Kernel Version3.1.4
LinuxLinux Kernel Version3.1.5
LinuxLinux Kernel Version3.1.6
LinuxLinux Kernel Version3.1.7
LinuxLinux Kernel Version3.1.8
LinuxLinux Kernel Version3.1.9
LinuxLinux Kernel Version3.1.10
LinuxLinux Kernel Version3.2
LinuxLinux Kernel Version3.2 Updaterc2
LinuxLinux Kernel Version3.2 Updaterc3
LinuxLinux Kernel Version3.2 Updaterc4
LinuxLinux Kernel Version3.2 Updaterc5
LinuxLinux Kernel Version3.2 Updaterc6
LinuxLinux Kernel Version3.2 Updaterc7
LinuxLinux Kernel Version3.2.1
LinuxLinux Kernel Version3.2.2
LinuxLinux Kernel Version3.2.3
LinuxLinux Kernel Version3.2.4
LinuxLinux Kernel Version3.2.5
LinuxLinux Kernel Version3.2.6
LinuxLinux Kernel Version3.2.7
LinuxLinux Kernel Version3.2.8
LinuxLinux Kernel Version3.2.9
LinuxLinux Kernel Version3.2.10
LinuxLinux Kernel Version3.2.11
LinuxLinux Kernel Version3.2.12
LinuxLinux Kernel Version3.2.13
LinuxLinux Kernel Version3.2.14
LinuxLinux Kernel Version3.2.15
LinuxLinux Kernel Version3.2.16
LinuxLinux Kernel Version3.2.17
LinuxLinux Kernel Version3.2.18
LinuxLinux Kernel Version3.2.19
LinuxLinux Kernel Version3.2.20
LinuxLinux Kernel Version3.2.21
LinuxLinux Kernel Version3.2.22
LinuxLinux Kernel Version3.2.23
LinuxLinux Kernel Version3.2.24
LinuxLinux Kernel Version3.2.25
LinuxLinux Kernel Version3.2.26
LinuxLinux Kernel Version3.2.27
LinuxLinux Kernel Version3.2.28
LinuxLinux Kernel Version3.2.29
LinuxLinux Kernel Version3.2.30
LinuxLinux Kernel Version3.3
LinuxLinux Kernel Version3.3 Updaterc1
LinuxLinux Kernel Version3.3 Updaterc2
LinuxLinux Kernel Version3.3 Updaterc3
LinuxLinux Kernel Version3.3 Updaterc4
LinuxLinux Kernel Version3.3 Updaterc5
LinuxLinux Kernel Version3.3 Updaterc6
LinuxLinux Kernel Version3.3 Updaterc7
LinuxLinux Kernel Version3.3.1
LinuxLinux Kernel Version3.3.2
LinuxLinux Kernel Version3.3.3
LinuxLinux Kernel Version3.3.4
LinuxLinux Kernel Version3.3.5
LinuxLinux Kernel Version3.3.6
LinuxLinux Kernel Version3.3.7
LinuxLinux Kernel Version3.3.8
LinuxLinux Kernel Version3.4
LinuxLinux Kernel Version3.4 Updaterc1
LinuxLinux Kernel Version3.4 Updaterc2
LinuxLinux Kernel Version3.4 Updaterc3
LinuxLinux Kernel Version3.4 Updaterc4
LinuxLinux Kernel Version3.4 Updaterc5
LinuxLinux Kernel Version3.4 Updaterc6
LinuxLinux Kernel Version3.4 Updaterc7
LinuxLinux Kernel Version3.4.1
LinuxLinux Kernel Version3.4.2
LinuxLinux Kernel Version3.4.3
LinuxLinux Kernel Version3.4.4
LinuxLinux Kernel Version3.4.5
LinuxLinux Kernel Version3.4.6
LinuxLinux Kernel Version3.4.7
LinuxLinux Kernel Version3.4.8
LinuxLinux Kernel Version3.4.9
LinuxLinux Kernel Version3.4.10
LinuxLinux Kernel Version3.4.11
LinuxLinux Kernel Version3.4.12
LinuxLinux Kernel Version3.4.13
LinuxLinux Kernel Version3.4.14
LinuxLinux Kernel Version3.4.15
LinuxLinux Kernel Version3.4.16
LinuxLinux Kernel Version3.4.17
LinuxLinux Kernel Version3.4.18
LinuxLinux Kernel Version3.4.19
LinuxLinux Kernel Version3.4.20
LinuxLinux Kernel Version3.4.21
LinuxLinux Kernel Version3.4.22
LinuxLinux Kernel Version3.4.23
LinuxLinux Kernel Version3.4.24
LinuxLinux Kernel Version3.5.1
LinuxLinux Kernel Version3.5.2
LinuxLinux Kernel Version3.5.3
LinuxLinux Kernel Version3.5.4
LinuxLinux Kernel Version3.5.5
LinuxLinux Kernel Version3.5.6
LinuxLinux Kernel Version3.5.7
LinuxLinux Kernel Version3.6.9
LinuxLinux Kernel Version3.6.10
LinuxLinux Kernel Version3.6.11
LinuxLinux Kernel Version3.7
LinuxLinux Kernel Version3.7.1
LinuxLinux Kernel Version3.7.2
LinuxLinux Kernel Version3.7.3
LinuxLinux Kernel Version3.7.4
LinuxLinux Kernel Version3.7.5
LinuxLinux Kernel Version3.7.6
LinuxLinux Kernel Version3.7.7
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.242
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.2 4.4 6.9
AV:A/AC:M/Au:S/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.