CVE-2015-5307 : Detail

CVE-2015-5307

0.11%V3
Local
2015-11-16
10h00 +00:00
2017-05-22
23h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.9 AV:L/AC:L/Au:N/C:N/I:N/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version To (including) 4.2.3

Configuraton 0

Xen>>Xen >> Version 4.3.0

Xen>>Xen >> Version 4.3.1

Xen>>Xen >> Version 4.3.2

Xen>>Xen >> Version 4.3.3

Xen>>Xen >> Version 4.3.4

Xen>>Xen >> Version 4.4.0

Xen>>Xen >> Version 4.4.1

Xen>>Xen >> Version 4.4.2

Xen>>Xen >> Version 4.4.3

Xen>>Xen >> Version 4.4.4

Xen>>Xen >> Version 4.5.0

Xen>>Xen >> Version 4.5.1

Xen>>Xen >> Version 4.5.2

Xen>>Xen >> Version 4.5.3

Xen>>Xen >> Version 4.5.5

Xen>>Xen >> Version 4.6.0

Xen>>Xen >> Version 4.6.1

Xen>>Xen >> Version 4.6.2

Xen>>Xen >> Version 4.6.3

Xen>>Xen >> Version 4.6.4

Xen>>Xen >> Version 4.6.5

Xen>>Xen >> Version 4.6.6

Configuraton 0

Oracle>>Vm_virtualbox >> Version From (including) 4.0.0 To (including) 4.0.34

Oracle>>Vm_virtualbox >> Version From (including) 4.1.0 To (including) 4.1.42

Oracle>>Vm_virtualbox >> Version From (including) 4.2.0 To (including) 4.2.34

Oracle>>Vm_virtualbox >> Version From (including) 4.3.0 To (including) 4.3.29

Oracle>>Vm_virtualbox >> Version From (including) 5.0.0 To (including) 5.0.8

Configuraton 0

Debian>>Debian_linux >> Version 7.0

Debian>>Debian_linux >> Version 8.0

Configuraton 0

Canonical>>Ubuntu_linux >> Version 12.04

Canonical>>Ubuntu_linux >> Version 14.04

Canonical>>Ubuntu_linux >> Version 15.10

References

http://rhn.redhat.com/errata/RHSA-2015-2636.html
Tags : vendor-advisory, x_refsource_REDHAT
https://kb.juniper.net/JSA10783
Tags : x_refsource_CONFIRM
http://www.debian.org/security/2016/dsa-3454
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.openwall.com/lists/oss-security/2015/11/10/6
Tags : mailing-list, x_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2015-2645.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.ubuntu.com/usn/USN-2802-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2806-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2805-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2807-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.ubuntu.com/usn/USN-2801-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2015/dsa-3414
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/USN-2800-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://www.securitytracker.com/id/1034105
Tags : vdb-entry, x_refsource_SECTRACK
http://www.ubuntu.com/usn/USN-2804-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://rhn.redhat.com/errata/RHSA-2016-0046.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.debian.org/security/2015/dsa-3396
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/77528
Tags : vdb-entry, x_refsource_BID
http://www.ubuntu.com/usn/USN-2803-1
Tags : vendor-advisory, x_refsource_UBUNTU