ID CVE-2010-0309
Summary The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
References
Vulnerable Configurations
  • cpe:2.3:a:linux:kernel:*:*:*:*:*:*:*:*
    cpe:2.3:a:linux:kernel:*:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 19-09-2017 - 01:30)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:N/A:C
oval via4
accepted 2013-04-29T04:11:29.534-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
family unix
id oval:org.mitre.oval:def:11095
status accepted
submitted 2010-07-09T03:56:16-04:00
title The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
version 18
redhat via4
advisories
  • bugzilla
    id 561022
    title QEMU terminates without warning with virtio-net and SMP enabled
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment kmod-kvm is earlier than 0:83-105.el5_4.22
          oval oval:com.redhat.rhsa:tst:20100088006
        • comment kmod-kvm is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091465005
      • AND
        • comment kvm is earlier than 0:83-105.el5_4.22
          oval oval:com.redhat.rhsa:tst:20100088002
        • comment kvm is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091465003
      • AND
        • comment kvm-qemu-img is earlier than 0:83-105.el5_4.22
          oval oval:com.redhat.rhsa:tst:20100088008
        • comment kvm-qemu-img is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091465007
      • AND
        • comment kvm-tools is earlier than 0:83-105.el5_4.22
          oval oval:com.redhat.rhsa:tst:20100088004
        • comment kvm-tools is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20091465009
    rhsa
    id RHSA-2010:0088
    released 2010-02-09
    severity Important
    title RHSA-2010:0088: kvm security and bug fix update (Important)
  • rhsa
    id RHSA-2010:0095
rpms
  • kmod-kvm-0:83-105.el5_4.22
  • kvm-0:83-105.el5_4.22
  • kvm-qemu-img-0:83-105.el5_4.22
  • kvm-tools-0:83-105.el5_4.22
refmap via4
bid 38158
confirm https://bugzilla.redhat.com/show_bug.cgi?id=560887
debian DSA-1996
mlist
  • [kvm] 20100129 KVM: PIT: control word is write-only
  • [oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS
  • [oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS
secunia
  • 38492
  • 38922
ubuntu USN-914-1
vupen ADV-2010-0638
Last major update 19-09-2017 - 01:30
Published 12-02-2010 - 19:30
Back to Top