Lucene search

K
archlinuxArch LinuxASA-201505-9
HistoryMay 14, 2015 - 12:00 a.m.

qemu: arbitrary code execution

2015-05-1400:00:00
Arch Linux
lists.archlinux.org
17

7.7 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:S/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

40.5%

The guest operating system communicates with the FDC by sending commands
such as seek, read, write, format, etc. to the FDC’s input/output port.
QEMU’s virtual FDC uses a fixed-size buffer for storing these commands
and their associated data parameters. The FDC keeps track of how much
data to expect for each command and, after all expected data for a given
command is received from the guest system, the FDC executes the command
and clears the buffer for the next command.

This buffer reset is performed immediately at the completion of
processing for all FDC commands, except for two of the defined commands.
An attacker can send these commands and specially crafted parameter data
from the guest system to the FDC to overflow the data buffer and execute
arbitrary code in the context of the host’s hypervisor process.

OSVersionArchitecturePackageVersionFilename
anyanyanyqemu< 2.2.1-5UNKNOWN

7.7 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:S/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

40.5%