First published: Wed Nov 13 2013(Updated: )
Microsoft Windows 8 and Windows Server 2012, when Hyper-V is used, does not ensure memory-address validity, which allows guest OS users to execute arbitrary code in all guest OS instances, and allows guest OS users to cause a denial of service (host OS crash), via a guest-to-host hypercall with a crafted function parameter, aka "Address Corruption Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows 8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3898 has a significant severity rating as it allows for execution of arbitrary code and potential host OS crashes.
To fix CVE-2013-3898, apply the security updates provided by Microsoft.
CVE-2013-3898 affects Microsoft Windows 8 and Windows Server 2012 when Hyper-V is used.
Exploiting CVE-2013-3898 can lead to unauthorized code execution within guest OS instances and potential denial of service.
Users and administrators of Microsoft Windows 8 and Windows Server 2012 utilizing Hyper-V are affected by CVE-2013-3898.