Vulnerability Name: | CVE-2016-8630 (CCN-119634) |
Assigned: | 2016-11-02 |
Published: | 2016-11-02 |
Updated: | 2023-02-12 |
Summary: | The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction. |
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 7.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) 6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 6.2 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H) 5.4 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Adjacent Attack Complexity (AC): Low Privileges Required (PR): High User Interaction (UI): None | Scope: | Scope (S): Changed
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete | 5.2 Medium (REDHAT CVSS v2 Vector: AV:A/AC:M/Au:S/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Adjacent_Network Access Complexity (AC): Medium Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-476
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2016-8630
Source: CCN Type: Linux Kernel GIT Repository x86: Check memopp before dereference (CVE-2016-8630)
Source: secalert@redhat.com Type: Issue Tracking, Patch, Vendor Advisory secalert@redhat.com
Source: CCN Type: RHSA-2017-0386 Important: kernel security, bug fix, and enhancement update
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: CCN Type: RHSA-2017-0387 Important: kernel-rt security and bug fix update
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: Release Notes secalert@redhat.com
Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com
Source: CCN Type: BID-94459 Linux Kernel 'kvm/emulate.c' Null Pointer Dereference Denial of Service Vulnerability
Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com
Source: secalert@redhat.com Type: Issue Tracking secalert@redhat.com
Source: XF Type: UNKNOWN linux-kernel-cve20168630-dos(119634)
Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisory secalert@redhat.com
Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-8630
|
Vulnerable Configuration: | Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*Configuration RedHat 2: cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*Configuration RedHat 3: cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*Configuration RedHat 4: cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*Configuration RedHat 5: cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*Configuration RedHat 6: cpe:/a:redhat:rhel_extras_rt:7:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:linux:linux_kernel:4.8.6:*:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |