CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
28.1%
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
www.debian.org/security/2017/dsa-3925
www.openwall.com/lists/oss-security/2017/07/17/4
www.securityfocus.com/bid/99895
access.redhat.com/errata/RHSA-2017:3369
access.redhat.com/errata/RHSA-2017:3466
access.redhat.com/errata/RHSA-2017:3470
access.redhat.com/errata/RHSA-2017:3471
access.redhat.com/errata/RHSA-2017:3472
access.redhat.com/errata/RHSA-2017:3473
access.redhat.com/errata/RHSA-2017:3474
bugzilla.redhat.com/show_bug.cgi?id=1471638
lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
usn.ubuntu.com/3575-1/
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
28.1%