Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-0309

Опубликовано: 07 янв. 2010
Источник: redhat
CVSS2: 4.9
EPSS Низкий

Описание

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=560887kvm: cat /dev/port in guest cause the host hang

EPSS

Процентиль: 67%
0.00552
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

nvd
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

msrc
больше 4 лет назад

Описание отсутствует

debian
больше 15 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) ...

github
около 3 лет назад

The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to read the /dev/port file.

EPSS

Процентиль: 67%
0.00552
Низкий

4.9 Medium

CVSS2