Versio.io

CVE-2015-5307

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-11-2015 01:00
Last modified: - 10-11-2015 01:00
Total changes: - 135

Description

CVE-2015-5307 virt: guest to host DoS by triggering an infinite loop in microcode via #AC exception

Common Vulnerability Scoring System (CVSS)

AV:A/AC:M/Au:S/C:N/I:N/A:C
Low
Attack complexity
Adjacent
Attack vector
High
Availability
None
Confidentiality
None
Integrity
-
Privileges required
-
Scope
-
User interaction
5.2
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=kernel-0 AND versionEndExcluding=2.6.32-573.12.1.el6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=kernel-0 AND versionEndExcluding=2.6.32-220.65.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_mission_critical AND version=6.2
AND
product=kernel-0 AND versionEndExcluding=2.6.32-358.69.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_aus AND version=6.4
AND
product=kernel-0 AND versionEndExcluding=2.6.32-431.68.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_aus AND version=6.5
AND
product=kernel-0 AND versionEndExcluding=2.6.32-504.40.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_eus AND version=6.6
AND
product=kernel-0 AND versionEndExcluding=3.10.0-327.3.1.el7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
AND
product=kernel-0 AND versionEndExcluding=3.10.0-229.24.2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_eus AND version=7.1
AND
product=kvm AND version=
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=xen AND version=
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
 

Reference

 


Keywords

REDHAT

 

CVE-2015-5307

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.