CERT-In Vulnerability Note
CIVN-2010-0265
Microsoft Windows Hyper-V Local Denial of Service Vulnerability
Original Issue Date:December 15, 2010
Severity Rating: MEDIUM
Systems Affected
- Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2 (including Server Core installation)
- Windows Server 2008 R2 for x64-based Systems (including Server Core installation)
Overview
A vulnerability has been reported in Microsoft Windows Hyper-V; successful exploitation of the vulnerability could allow Denial of Service (DoS) on vulnerable system.
Description
Hyper-V is a hypervisor-based technology that is a key feature of Windows Server 2008 and Windows Server 2008 R2. It provides a scalable, reliable, and highly available virtualization platform. A virtualization environment is useful because users can create and manage virtual machines, allowing them to run multiple operating systems on one physical computer and isolate the operating systems from each other.
The VMBus is a logical inter-partition communication channel.
A Denial of Service (DoS) vulnerability has been reported in Hyper-V which is caused when the Hyper-V server incorrectly validates specially encapsulated packets sent to the Hyper-V VMBus. Due to this lack of validation, processing of these packets may cause the Hyper-V server application to become non-responsive, creating a Denial of Service (DoS) condition.
An attacker would have to be an authenticated local user in one of the guest virtual machines hosted by the Hyper-V server and would need to have the ability to execute arbitrary code on the system. An attacker would have to then create a custom driver that creates specially crafted packets to be passed to the VMBus and thereby cause the Hyper-V server to become non-responsive.
Successful exploitation of this vulnerability could cause the Hyper-V server to stop responding, including all guest virtual machines hosted by that server.
Solution
Apply patches as mentioned in Microsoft Security bulletin
MS10-102
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS10-102.mspx
References
Microsoft
http://www.microsoft.com/technet/security/Bulletin/MS10-102.mspx
Vupen
http://www.vupen.com/english/advisories/2010/3224
Secunia
http://secunia.com/advisories/42617
SecurityFocus
http://www.securityfocus.com/bid/45293
SecurityTracker
http://securitytracker.com/alerts/2010/Dec/1024884.html
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=21984
CVE Name
CVE-2010-3960
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|