4.4

CVE-2015-0239

Exploit

The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 3.18.5
CanonicalUbuntu Linux Version12.04 SwEditionlts
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version14.10
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
OracleLinux Version5 Update-
OracleLinux Version7 Update-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.1% 0.285
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.4 3.4 6.4
AV:L/AC:M/Au:N/C:P/I:P/A:P
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

http://www.openwall.com/lists/oss-security/2015/01/27/6
Third Party Advisory
Exploit
Mailing List
http://www.securityfocus.com/bid/72842
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1186448
Third Party Advisory
Issue Tracking