Vulnerability Name: | CCN-116084 | ||||||
Published: | 2016-08-09 | ||||||
Updated: | 2016-08-09 | ||||||
Summary: | QEMU is vulnerable to a denial of service, caused by an error in the Vmxnet3 Device Emulator. A local attacker as a guest system administrative user could exploit this vulnerability to trigger packet fragmentation bug and cause the host system to enter an infinite loop and crash. | ||||||
CVSS v3 Severity: | 7.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) 6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
| ||||||
Vulnerability Consequences: | Denial of Service | ||||||
References: | Source: CCN Type: SECTRACK ID: 1036613 QEMU Packet Fragmentation Bug in Vmxnet3 Device Emulator Lets Local Users on a Guest System Cause Denial of Service Conditions on the Host System Source: XF Type: UNKNOWN qemu-vmxnet3-packetfrag-dos(116084) Source: CCN Type: qemu-devel Web site [Qemu-devel] [PULL 1/3] net: check fragment length during fragmentation | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |