The NetKVM Windows Virtio driver allows remote attackers to cause a denial of service (guest crash) via a crafted length value in an IP packet, as demonstrated by a value that does not account for the size of the IP options.
References
Link | Resource |
---|---|
https://www.redhat.com/security/data/cve/CVE-2015-3215.html | Vendor Advisory |
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/fbfa4d1083ea84c5429992ca3e996d7d4fbc8238 | Patch Third Party Advisory |
https://github.com/YanVugenfirer/kvm-guest-drivers-windows/commit/723416fa4210b7464b28eab89cc76252e6193ac1 | Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1044.html | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1043.html | Vendor Advisory |
Configurations
Information
Published : 2017-06-26 08:29
Updated : 2023-02-12 16:48
NVD link : CVE-2015-3215
Mitre link : CVE-2015-3215
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
redhat
- virtio-win