MS KB3108638: Update for Windows Hyper-V to Address CPU Weakness

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple denial of service
vulnerabilities.

Description :

The remote Windows host is affected by multiple denial of service
vulnerabilities that can be triggered with certain central processing
unit (CPU) chipsets. A local attacker with kernel-mode privileges on a
Hyper-V guest can exploit this to cause all Hyper-V guests to become
unresponsive.

See also :

https://technet.microsoft.com/en-us/library/security/3108638
https://support.microsoft.com/en-us/kb/3108638
https://support.microsoft.com/en-us/kb/3108604
https://support.microsoft.com/en-us/kb/3105213

Solution :

Microsoft has released a set of patches for Windows 2008, 2008 R2, 8,
2012, 8.1, 2012 R2, and 10.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 4.7
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 86818 ()

Bugtraq ID:

CVE ID: CVE-2015-5307
CVE-2015-8104

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now