Versio.io

CVE-2015-3214

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 31-08-2015 12:59
Last modified: - 20-02-2022 06:55
Total changes: - 3

Description

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.

Common Vulnerability Scoring System (CVSS)

AV:L/AC:M/Au:N/C:C/I:C/A:C
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
-
Privileges required
-
Scope
-
User interaction
6.9
Base score
3.4
10.0
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=qemu AND product=qemu AND versionEndIncluding=2.3.0
vendor=linux AND product=linux_kernel AND versionEndIncluding=2.6.32
OR
vendor=arista AND product=eos AND version=4.12
vendor=arista AND product=eos AND version=4.13
vendor=arista AND product=eos AND version=4.14
vendor=arista AND product=eos AND version=4.15
OR
vendor=Debian AND product=debian_linux AND version=7.0
vendor=Debian AND product=debian_linux AND version=8.0
OR
vendor=lenovo AND product=emc_px12-400r_ivx AND versionEndExcluding=1.0.10.33264
vendor=lenovo AND product=emc_px12-450r_ivx AND versionEndExcluding=1.0.10.33264
OR
vendor=Red Hat Enterprise Linux AND product=openstack AND version=5.0
vendor=Red Hat Enterprise Linux AND product=openstack AND version=6.0
vendor=Red Hat Enterprise Linux AND product=virtualization AND version=3.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.1
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.2
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.3
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.5
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_compute_node_eus AND version=7.7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian AND version=7.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.1_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.2_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.3_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.4_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.5_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.6_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_power_big_endian_eus AND version=7.7_ppc64
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_for_scientific_computing AND version=7.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server AND version=7.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_aus AND version=7.3
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_aus AND version=7.4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_aus AND version=7.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_aus AND version=7.7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.1
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.2
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.3
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.5
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_eus AND version=7.7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_from_rhui AND version=7.0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_tus AND version=7.3
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_tus AND version=7.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_tus AND version=7.7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_update_services_for_sap_solutions AND version=7.2
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_update_services_for_sap_solutions AND version=7.3
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_update_services_for_sap_solutions AND version=7.4
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_update_services_for_sap_solutions AND version=7.6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_server_update_services_for_sap_solutions AND version=7.7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux_workstation AND version=7.0
 

Reference

 


Keywords

NVD

 

CVE-2015-3214

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.