7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
53.2%
DISPUTED An issue was discovered in ide_dma_cb() in hw/ide/core.c in
QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in
the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion
that implies that the size of successful DMA transfers there must be a
multiple of 512 (the size of a sector). NOTE: a member of the QEMU security
team disputes the significance of this issue because a “privileged guest
user has many ways to cause similar DoS effect, without triggering this
assert.”
Author | Note |
---|---|
mdeslaur | issue was disputed by the qemu security team, marking as not-affected |
launchpad.net/bugs/cve/CVE-2019-20175
lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html
lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html
lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html
lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html
nvd.nist.gov/vuln/detail/CVE-2019-20175
security-tracker.debian.org/tracker/CVE-2019-20175
www.cve.org/CVERecord?id=CVE-2019-20175
www.mail-archive.com/[email protected]/msg667396.html
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
53.2%