[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Address corruption vulnerability in Hyper-V via a guest-to-host hypercall

ID: oval:org.secpod.oval:def:15996Date: (C)2013-11-14   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The host is installed with Windows 8 or Windows 2012 and is prone to an address corruption vulnerability. The flaw is present in Hyper-V, which is caused when the value of a data structure is not properly verified. Successful exploitation could allow denial of service for the Hyper-V host if the attacker passes a specially crafted function parameter in a hypercall from an existing running virtual machine to the hypervisor

Platform:
Microsoft Windows 8
Microsoft Windows Server 2012
Product:
Microsoft Hyper-V Server
Reference:
CVE-2013-3898
CVE    1
CVE-2013-3898
CPE    5
cpe:/o:microsoft:windows_8
cpe:/o:microsoft:windows_8:-:-:x64
cpe:/a:microsoft:hyper-v_server
cpe:/o:microsoft:windows_server_2012:-:-:x64
...

© SecPod Technologies