#VU28410 Input validation error in Linux kernel


Published: 2013-03-22 | Updated: 2020-07-20

Vulnerability identifier: #VU28410

Vulnerability risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2013-1798

CWE-ID: CWE-20

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.19 - 4.19.102, 4.9 - 4.9.213, 4.14 - 4.14.170, 5.0 - 5.0.21, 5.1 - 5.1.21, 5.2 - 5.2.21, 5.3 - 5.3.18, 5.4 - 5.4.42, 5.5 - 5.5.19


External links
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.103
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.19
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.3
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.214
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.171
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability