Vulnerability CVE-2017-12188


Published: 2017-10-11

Description:
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Linux -> Linux kernel 

 References:
http://www.securityfocus.com/bid/101267
https://access.redhat.com/errata/RHSA-2018:0395
https://access.redhat.com/errata/RHSA-2018:0412
https://bugzilla.redhat.com/show_bug.cgi?id=1500380
https://patchwork.kernel.org/patch/9996579/
https://patchwork.kernel.org/patch/9996587/

Copyright 2024, cxsecurity.com

 

Back to Top