CVE-2010-0298
kvm: emulator privilege escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The x86 emulator in KVM 83 does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) in determining the memory access available to CPL3 code, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, a related issue to CVE-2010-0306.
El emulador x86 en KVM3, no usa Current Privilege Level (CPL) e I/O Privilege Level (IOPL) para para determinar el acceso a memoria disponible para el código CPL3, lo que permite a invitados del SO provocar una denegación de servicio (caída del SO invitado) o elevar sus privilegios aprovechando el acceso al (1) puerto IO o (2) a la región MMIO. Cuestión relacionada con CVE-2010-0306.
It was discovered that the Linux kernel did not correctly handle memory protection of the Virtual Dynamic Shared Object page when running a 32-bit application on a 64-bit kernel. It was discovered that the r8169 network driver did not correctly check the size of Ethernet frames. Wei Yongjun discovered that SCTP did not correctly validate certain chunks. It was discovered that KVM did not correctly limit certain privileged IO accesses on x86. Evgeniy Polyakov discovered that IPv6 did not correctly handle certain TUN packets. Tons of other vulnerabilities have also been discovered and addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-01-12 CVE Reserved
- 2010-02-12 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/38492 | Not Applicable | |
http://www.securityfocus.com/bid/38158 | Broken Link | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11335 | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2010/dsa-1996 | 2024-06-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=559091 | 2010-02-09 | |
https://rhn.redhat.com/errata/RHSA-2010-0088.html | 2024-06-27 | |
https://rhn.redhat.com/errata/RHSA-2010-0095.html | 2024-06-27 | |
https://access.redhat.com/security/cve/CVE-2010-0298 | 2010-02-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 2.6.28 <= 2.6.33 Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.28 <= 2.6.33" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
|