CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.4%
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the “Dark Portal” issue.
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
hp | helion_openstack | 2.0.0 | cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:* |
hp | helion_openstack | 2.1.0 | cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:* |
hp | helion_openstack | 2.1.2 | cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:* |
hp | helion_openstack | 2.1.4 | cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 12.04 | cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 14.04 | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 15.10 | cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 16.04 | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
qemu | qemu | * | cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* |
rhn.redhat.com/errata/RHSA-2016-0724.html
rhn.redhat.com/errata/RHSA-2016-0725.html
rhn.redhat.com/errata/RHSA-2016-0997.html
rhn.redhat.com/errata/RHSA-2016-0999.html
rhn.redhat.com/errata/RHSA-2016-1000.html
rhn.redhat.com/errata/RHSA-2016-1001.html
rhn.redhat.com/errata/RHSA-2016-1002.html
rhn.redhat.com/errata/RHSA-2016-1019.html
rhn.redhat.com/errata/RHSA-2016-1943.html
support.citrix.com/article/CTX212736
www.debian.org/security/2016/dsa-3573
www.openwall.com/lists/oss-security/2016/05/09/3
www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/90316
www.securitytracker.com/id/1035794
www.ubuntu.com/usn/USN-2974-1
xenbits.xen.org/xsa/advisory-179.html
access.redhat.com/errata/RHSA-2016:1224
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html
More
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
58.4%