Lucene search

K
freebsdFreeBSD9CFBCA7F-EFB7-11DC-BE01-0211060005DF
HistoryFeb 19, 2008 - 12:00 a.m.

qemu -- unchecked block read/write vulnerability

2008-02-1900:00:00
vuxml.freebsd.org
19

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

25.5%

Ian Jackson reports on the debian-security mailinglist:

When a block device read or write request is made by the guest,
nothing checks that the request is within the range supported by
the backend, but the code in the backend typically assumes that
the request is sensible.
Depending on the backend, this can allow the guest to read
and write arbitrary memory locations in qemu, and possibly gain
control over the qemu process, escaping from the
emulation/virtualisation.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchqemu< 0.9.1_2UNKNOWN
FreeBSDanynoarchqemu-devel< 0.9.1_2UNKNOWN

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

25.5%