6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.2 Medium
AI Score
Confidence
High
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
56.9%
eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. (CVE-2020-27617)
Impact
BIG-IP
This flaw allows a guest user to cause the QEMU process on the host to stop responding, resulting in a denial of service (DoS).
This affects all BIG-IP platforms with Virtual Clustered Multiprocessing (vCMP) enabled. For more information on vCMP platforms, refer to K14088: vCMP host and compatible guest version matrix
CPE | Name | Operator | Version |
---|---|---|---|
big-ip aam | eq | 11.6.1 | |
big-ip aam | eq | 11.6.2 | |
big-ip aam | eq | 11.6.3 | |
big-ip aam | eq | 11.6.4 | |
big-ip aam | eq | 11.6.5 | |
big-ip aam | eq | 12.1.0 | |
big-ip aam | eq | 12.1.1 | |
big-ip aam | eq | 12.1.2 | |
big-ip aam | eq | 12.1.3 | |
big-ip aam | eq | 12.1.4 |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.2 Medium
AI Score
Confidence
High
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
56.9%