Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-20175
HistoryDec 31, 2019 - 12:00 a.m.

CVE-2019-20175

2019-12-3100:00:00
ubuntu.com
ubuntu.com
6

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

53.2%

DISPUTED An issue was discovered in ide_dma_cb() in hw/ide/core.c in
QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in
the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion
that implies that the size of successful DMA transfers there must be a
multiple of 512 (the size of a sector). NOTE: a member of the QEMU security
team disputes the significance of this issue because a “privileged guest
user has many ways to cause similar DoS effect, without triggering this
assert.”

Notes

Author Note
mdeslaur issue was disputed by the qemu security team, marking as not-affected

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.002 Low

EPSS

Percentile

53.2%