6.8
CVE-2013-1797
- EPSS 1.11%
- Veröffentlicht 22.03.2013 11:59:11
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version <= 3.8.4
Linux ≫ Linux Kernel Version3.8.0
Linux ≫ Linux Kernel Version3.8.1
Linux ≫ Linux Kernel Version3.8.2
Linux ≫ Linux Kernel Version3.8.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.11% | 0.774 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 3.2 | 10 |
AV:A/AC:H/Au:N/C:C/I:C/A:C
|