Vulnerability Name: | CCN-116086 | ||||||
Published: | 2016-08-11 | ||||||
Updated: | 2016-08-11 | ||||||
Summary: | QEMU could allow a local attacker to obtain sensitive information, caused by an error when processing transmit Queue by the Vmxnet3 Device Emulator. By leveraging transmit queue processing, an attacker could exploit this vulnerability to obtain sensitive information. | ||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: SECTRACK ID: 1036615 QEMU Vmxnet3 Device Emulator Bug in Processing Transmit Queue Lets Local Users on the Guest System Obtain Potentially Sensitive Information on the Host System Source: XF Type: UNKNOWN qemu-vmxnet3-transmitqueue-info-disc(116086) Source: CCN Type: qemu-devel Web site [Qemu-devel] [PATCH] net: vmxnet: initialise local tx descriptor | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |