Files
CVEs-PoC/2014/CVE-2014-3610.md
T
2024-06-18 02:51:15 +02:00

18 lines
882 B
Markdown

### [CVE-2014-3610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2394-1
#### Github
No PoCs found on GitHub currently.