Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3215

Опубликовано: 15 дек. 2014
Источник: redhat
CVSS2: 6.1

Описание

The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.

It was found that the Windows Virtio NIC driver did not sufficiently sanitize the length of the incoming IP packets, as demonstrated by a packet with IP options present but the overall packet length not being adjusted to reflect the length of those options. A remote attacker able to send a specially crafted IP packet to the guest could use this flaw to crash that guest.

Отчет

This issue does affect the virtio-win packages as shipped with Red Hat Enteprise Linux 6 and 7. Future updates for the respective releases will address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5virtio-winWill not fix
Supplementary for Red Hat Enterprise Linux 6virtio-winFixedRHSA-2015:104303.06.2015
Supplementary for Red Hat Enterprise Linux 7virtio-winFixedRHSA-2015:104403.06.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1227634virtio-win: netkvm: malformed packet can cause BSOD

6.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.

CVSS3: 7.5
github
больше 3 лет назад

The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.

6.1 Medium

CVSS2