7.6 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
26.2%
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 14.10 | |
ubuntu_linux | eq | 15.04 | |
ubuntu_linux | eq | 12.04 | |
ubuntu_linux | eq | 14.04 | |
xenserver | eq | 6.0.2 | |
xenserver | eq | 6.0 | |
xenserver | eq | 6.1.0 | |
xenserver | eq | 6.5 | |
xenserver | eq | 6.2.0 | |
debian_linux | eq | 8.0 |
lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
support.citrix.com/article/CTX201145
www.debian.org/security/2015/dsa-3284
www.debian.org/security/2015/dsa-3286
www.securityfocus.com/bid/74949
www.securitytracker.com/id/1032467
www.ubuntu.com/usn/USN-2630-1
xenbits.xen.org/xsa/advisory-131.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/160154.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/160171.html
lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
security.gentoo.org/glsa/201604-03
support.citrix.com/article/CTX206006