6.5 Medium
AI Score
Confidence
Low
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
0.001 Low
EPSS
Percentile
24.3%
Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
secunia.com/advisories/29081
secunia.com/advisories/29129
secunia.com/advisories/29136
secunia.com/advisories/29172
secunia.com/advisories/29963
secunia.com/advisories/34642
secunia.com/advisories/35031
www.debian.org/security/2009/dsa-1799
www.mandriva.com/security/advisories?name=MDVSA-2008:162
www.mandriva.com/security/advisories?name=MDVSA-2009:016
www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
www.redhat.com/support/errata/RHSA-2008-0194.html
www.securityfocus.com/bid/28001
bugzilla.redhat.com/show_bug.cgi?id=433560
marc.info/?l=debian-security&m=120343592917055&w=2
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html