Lucene search

K
freebsdFreeBSD152ACFF3-B1BD-11E5-9728-002590263BF5
HistoryNov 19, 2015 - 12:00 a.m.

qemu -- denial of service vulnerability in Q35 chipset emulation

2015-11-1900:00:00
vuxml.freebsd.org
19

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

0.001 Low

EPSS

Percentile

29.1%

Prasad J Pandit, Red Hat Product Security Team, reports:

Qemu emulator built with the Q35 chipset based pc system emulator
is vulnerable to a heap based buffer overflow. It occurs during VM
guest migration, as more(16 bytes) data is moved into allocated
(8 bytes) memory area.
A privileged guest user could use this issue to corrupt the VM
guest image, potentially leading to a DoS. This issue affects q35
machine types.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchqemu<Β 2.5.50UNKNOWN
FreeBSDanynoarchqemu-devel<Β 2.5.50UNKNOWN
FreeBSDanynoarchqemu-sbruno<Β 2.5.50.g20151224UNKNOWN
FreeBSDanynoarchqemu-user-static<Β 2.5.50.g20151224UNKNOWN

7.9 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H

3.3 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:N/I:P/A:P

0.001 Low

EPSS

Percentile

29.1%