ID CVE-2010-0309
Summary The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
References
Vulnerable Configurations
  • cpe:2.3:a:linux:kernel:*:*:*:*:*:*:*:*
    cpe:2.3:a:linux:kernel:*:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 13-02-2023 - 04:15)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:N/I:N/A:C
oval via4
accepted 2013-04-29T04:11:29.534-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
family unix
id oval:org.mitre.oval:def:11095
status accepted
submitted 2010-07-09T03:56:16-04:00
title The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.
version 18
redhat via4
advisories
  • bugzilla
    id 561022
    title QEMU terminates without warning with virtio-net and SMP enabled
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • comment kmod-kvm is earlier than 0:83-105.el5_4.22
            oval oval:com.redhat.rhsa:tst:20100088001
          • comment kmod-kvm is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091465002
        • AND
          • comment kvm is earlier than 0:83-105.el5_4.22
            oval oval:com.redhat.rhsa:tst:20100088003
          • comment kvm is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091465004
        • AND
          • comment kvm-qemu-img is earlier than 0:83-105.el5_4.22
            oval oval:com.redhat.rhsa:tst:20100088005
          • comment kvm-qemu-img is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091465006
        • AND
          • comment kvm-tools is earlier than 0:83-105.el5_4.22
            oval oval:com.redhat.rhsa:tst:20100088007
          • comment kvm-tools is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20091465008
    rhsa
    id RHSA-2010:0088
    released 2010-02-09
    severity Important
    title RHSA-2010:0088: kvm security and bug fix update (Important)
  • rhsa
    id RHSA-2010:0095
rpms
  • kmod-kvm-0:83-105.el5_4.22
  • kvm-0:83-105.el5_4.22
  • kvm-debuginfo-0:83-105.el5_4.22
  • kvm-qemu-img-0:83-105.el5_4.22
  • kvm-tools-0:83-105.el5_4.22
  • rhev-hypervisor-0:5.4-2.1.8.el5_4rhev2_1
  • rhev-hypervisor-pxe-0:5.4-2.1.8.el5_4rhev2_1
refmap via4
bid 38158
confirm https://bugzilla.redhat.com/show_bug.cgi?id=560887
debian DSA-1996
mlist
  • [kvm] 20100129 KVM: PIT: control word is write-only
  • [oss-security] 20100202 CVE request - kvm: cat /dev/port in the guest can cause host DoS
  • [oss-security] 20100202 Re: CVE request - kvm: cat /dev/port in the guest can cause host DoS
secunia
  • 38492
  • 38922
ubuntu USN-914-1
vupen ADV-2010-0638
Last major update 13-02-2023 - 04:15
Published 12-02-2010 - 19:30
Last modified 13-02-2023 - 04:15
Back to Top