Address corruption vulnerability in Hyper-V via a guest-to-host hypercallID: oval:org.secpod.oval:def:15996 | Date: (C)2013-11-14 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
The host is installed with Windows 8 or Windows 2012 and is prone to an address corruption vulnerability. The flaw is present in Hyper-V, which is caused when the value of a data structure is not properly verified. Successful exploitation could allow denial of service for the Hyper-V host if the attacker passes a specially crafted function parameter in a hypercall from an existing running virtual machine to the hypervisor
Platform: |
Microsoft Windows 8 |
Microsoft Windows Server 2012 |
Product: |
Microsoft Hyper-V Server |