6.9

CVE-2015-3214

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

Data is provided by the National Vulnerability Database (NVD)
QemuQemu Version <= 2.3.0
LinuxLinux Kernel Version <= 2.6.32
AristaEos Version4.12
AristaEos Version4.13
AristaEos Version4.14
AristaEos Version4.15
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
LenovoEmc Px12-400r Ivx Version < 1.0.10.33264
LenovoEmc Px12-450r Ivx Version < 1.0.10.33264
RedhatOpenstack Version5.0
RedhatOpenstack Version6.0
RedhatVirtualization Version3.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.47% 0.801
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

https://security.gentoo.org/glsa/201510-02
Third Party Advisory
Issue Tracking
http://rhn.redhat.com/errata/RHSA-2015-1507.html
Third Party Advisory
Issue Tracking
http://rhn.redhat.com/errata/RHSA-2015-1508.html
Third Party Advisory
Issue Tracking
http://www.debian.org/security/2015/dsa-3348
Third Party Advisory
Issue Tracking
http://www.securityfocus.com/bid/75273
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1032598
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/37990/
Third Party Advisory
VDB Entry