Vulnerability Name:

CVE-2015-0239 (CCN-100597)

Assigned:2014-11-18
Published:2015-01-27
Updated:2023-02-13
Summary:The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.
CVSS v3 Severity:8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
3.2 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
4.6 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.2 Medium (REDHAT CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
4.6 Medium (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-391
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2015-0239

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Linux Kernel GIT Repository
KVM: x86: SYSENTER emulation is broken

Source: secalert@redhat.com
Type: Broken Link
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Release Notes, Vendor Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: oss-security Mailing List, Tue, 27 Jan 2015 14:17:22 +0200
KVM SYSENTER emulation vulnerability - CVE-2015-0239

Source: secalert@redhat.com
Type: Exploit, Mailing List, Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: BID-72842
Linux Kernel KVM CVE-2015-0239 Local Privilege Escalation Vulnerability

Source: secalert@redhat.com
Type: Third Party Advisory, VDB Entry
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: secalert@redhat.com
Type: Third Party Advisory
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla – Bug 1186448
(CVE-2015-0239) CVE-2015-0239 kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code

Source: secalert@redhat.com
Type: Issue Tracking, Third Party Advisory
secalert@redhat.com

Source: XF
Type: UNKNOWN
linux-kernel-cve20150239-priv-esc(100597)

Source: secalert@redhat.com
Type: Patch, Third Party Advisory
secalert@redhat.com

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-0239

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*
  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*
  • Configuration RedHat 10:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20150239
    V
    CVE-2015-0239
    2023-02-13
    oval:org.opensuse.security:def:30286
    P
    Security update for chrony (Moderate)
    2021-12-22
    oval:org.opensuse.security:def:33976
    P
    Security update for gtk-vnc (Moderate)
    2021-09-16
    oval:org.opensuse.security:def:30237
    P
    Security update for openssl (Important)
    2021-08-24
    oval:org.opensuse.security:def:33687
    P
    Security update for the Linux Kernel (Important)
    2021-07-21
    oval:org.opensuse.security:def:33919
    P
    Security update for gstreamer-plugins-bad (Important)
    2021-06-07
    oval:org.opensuse.security:def:30182
    P
    Security update for clamav (Important)
    2021-04-14
    oval:org.opensuse.security:def:30029
    P
    Security update for java-1_8_0-openjdk (Moderate)
    2021-02-19
    oval:org.opensuse.security:def:34437
    P
    Security update for flac (Moderate)
    2021-01-04
    oval:org.opensuse.security:def:29667
    P
    Security update for dbus-1 (Important)
    2020-12-01
    oval:org.opensuse.security:def:35115
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:30344
    P
    Security update for unzip (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34222
    P
    Security update for php5 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29886
    P
    Security update for kernel-source (Important)
    2020-12-01
    oval:org.opensuse.security:def:33593
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:31026
    P
    Security update for java-1_7_0-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:34329
    P
    Security update for sane-backends (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29582
    P
    Security update for apache2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34393
    P
    Security update for unzip
    2020-12-01
    oval:org.opensuse.security:def:29594
    P
    Security update for arpwatch
    2020-12-01
    oval:org.opensuse.security:def:35075
    P
    Security update for java-1_7_0-ibm (Important)
    2020-12-01
    oval:org.opensuse.security:def:30325
    P
    Security update for tiff (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:34065
    P
    Security update for libxml2 (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29799
    P
    Security update for icu (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33592
    P
    Security update for MozillaFirefox (Important)
    2020-12-01
    oval:org.opensuse.security:def:30388
    P
    Security update for xen (Important)
    2020-12-01
    oval:org.opensuse.security:def:34280
    P
    Security update for python (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29943
    P
    Security update for liblouis (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:33604
    P
    Security update for MozillaFirefox (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:31063
    P
    Security update for the Linux Kernel (Important)
    2020-12-01
    oval:org.opensuse.security:def:34368
    P
    Security update for tgt
    2020-12-01
    oval:org.opensuse.security:def:33823
    P
    Security update for glibc (Moderate)
    2020-12-01
    oval:org.opensuse.security:def:29583
    P
    Security update for apache2 (Important)
    2020-12-01
    oval:org.cisecurity:def:189
    P
    DSA-3170-1 -- linux -- security update
    2016-02-08
    oval:com.redhat.rhsa:def:20152152
    P
    RHSA-2015:2152: kernel security, bug fix, and enhancement update (Important)
    2015-11-19
    oval:com.redhat.rhsa:def:20151272
    P
    RHSA-2015:1272: kernel security, bug fix, and enhancement update (Moderate)
    2015-07-22
    oval:com.ubuntu.xenial:def:201502390000000
    V
    CVE-2015-0239 on Ubuntu 16.04 LTS (xenial) - high.
    2015-03-02
    oval:com.ubuntu.xenial:def:20150239000
    V
    CVE-2015-0239 on Ubuntu 16.04 LTS (xenial) - high.
    2015-03-02
    oval:com.ubuntu.precise:def:20150239000
    V
    CVE-2015-0239 on Ubuntu 12.04 LTS (precise) - high.
    2015-03-02
    oval:com.ubuntu.trusty:def:20150239000
    V
    CVE-2015-0239 on Ubuntu 14.04 LTS (trusty) - high.
    2015-03-02
    BACK
    linux kernel 2.6.32