The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2015-1043.html | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1044.html | Vendor Advisory |
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/723416fa4210b7464b28eab89cc76252e6193ac1 | Patch Third Party Advisory |
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/fbfa4d1083ea84c5429992ca3e996d7d4fbc8238 | Patch Third Party Advisory |
https://www.redhat.com/security/data/cve/CVE-2015-3215.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2017-06-26 15:29
Updated : 2024-02-04 19:29
NVD link : CVE-2015-3215
Mitre link : CVE-2015-3215
CVE.ORG link : CVE-2015-3215
JSON object : View
Products Affected
redhat
- virtio-win
CWE
CWE-20
Improper Input Validation