Vulnerability Name:

CVE-2011-1751 (CCN-76737)

Assigned:2011-05-18
Published:2011-05-18
Updated:2023-02-13
Summary:The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."
CVSS v3 Severity:4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.4 High (CVSS v2 Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C)
5.4 Medium (Temporal CVSS v2 Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
3.3 Low (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
2.4 Low (CCN Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
7.4 High (REDHAT CVSS v2 Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C)
5.4 Medium (REDHAT Temporal CVSS v2 Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Denial of Service
References:Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: MITRE
Type: CNA
CVE-2011-1751

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: KVM GIT Repository
Ignore pci unplug requests for unpluggable devices (CVE-2011-1751)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: RHSA-2011-0534
Important: qemu-kvm security, bug fix, and enhancement update

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: SA44458
Qemu PIIX4 Hotplug Vulnerability

Source: CCN
Type: SA44648
KVM qemu-kvm PIIX4 Hotplug Vulnerability

Source: DEBIAN
Type: DSA-2241
qemu-kvm -- implementation error

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: OSVDB ID: 73395
Qemu PIIX4 Hotplug Invalid Memory Dereference Arbitrary Code Execution

Source: CCN
Type: BID-47927
QEMU PIIX4 Hotplug Use After Free Remote Code Execution Vulnerability

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: CCN
Type: Red Hat Bugzilla Bug 699773
CVE-2011-1751 qemu: acpi_piix4: missing hotplug check during device removal

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: XF
Type: UNKNOWN
qemukvm-pciejwrite-dos(76737)

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Source: secalert@redhat.com
Type: UNKNOWN
secalert@redhat.com

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.7.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.4.3:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.6.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.5:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.4:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0:-:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.13.0:-:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.14.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.14.0:-:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.5:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.1:rc4:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.4:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.6:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.0:-:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.3:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.0:rc4:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:1.1:-:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.0:-:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.3:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.12.2:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20111751
    V
    CVE-2011-1751
    2022-05-20
    oval:org.mitre.oval:def:14005
    P
    USN-1145-1 -- qemu-kvm vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:12667
    P
    DSA-2241-1 qemu-kvm -- implementation error
    2014-06-23
    oval:org.mitre.oval:def:22883
    P
    ELSA-2011:0534: qemu-kvm security, bug fix, and enhancement update (Important)
    2014-05-26
    oval:org.mitre.oval:def:21922
    P
    RHSA-2011:0534: qemu-kvm security, bug fix, and enhancement update (Important)
    2014-02-24
    oval:com.redhat.rhsa:def:20110534
    P
    RHSA-2011:0534: qemu-kvm security, bug fix, and enhancement update (Important)
    2011-05-19
    BACK
    qemu qemu 0.9.0
    qemu qemu 0.7.2
    qemu qemu 0.8.0
    qemu qemu 0.8.1
    qemu qemu 0.8.2
    qemu qemu 0.9.1
    qemu qemu 0.4.1
    qemu qemu 0.4
    qemu qemu 0.3
    qemu qemu 0.2
    qemu qemu 0.5.1
    qemu qemu 0.5.0
    qemu qemu 0.4.3
    qemu qemu 0.4.2
    qemu qemu 0.5.5
    qemu qemu 0.5.4
    qemu qemu 0.5.3
    qemu qemu 0.5.2
    qemu qemu 0.7.1
    qemu qemu 0.7.0
    qemu qemu 0.6.1
    qemu qemu 0.6.0
    qemu qemu 0.12.0 rc1
    qemu qemu 0.12.5
    qemu qemu 0.12.4
    qemu qemu 0.13.0 rc1
    qemu qemu 0.13.0 rc0
    qemu qemu 0.11.0
    qemu qemu 0.14.0 rc0
    qemu qemu 0.13.0
    qemu qemu 0.1.1
    qemu qemu 0.14.0 rc2
    qemu qemu 0.1.2
    qemu qemu 0.14.0 rc1
    qemu qemu 0.14.1
    qemu qemu 0.1
    qemu qemu 0.14.0
    qemu qemu 0.1.5
    qemu qemu 0.15.0 rc2
    qemu qemu 0.1.6
    qemu qemu 0.15.0 rc1
    qemu qemu 1.0 rc2
    qemu qemu 0.1.3
    qemu qemu 1.0 rc1
    qemu qemu 0.1.4
    qemu qemu 1.1 rc3
    qemu qemu 0.10.5
    qemu qemu 1.1 rc4
    qemu qemu 0.10.4
    qemu qemu 1.1 rc1
    qemu qemu 1.1 rc2
    qemu qemu 0.10.6
    qemu qemu 1.0
    qemu qemu 0.10.1
    qemu qemu 1.0.1
    qemu qemu 0.10.0
    qemu qemu 1.0 rc3
    qemu qemu 0.10.3
    qemu qemu 1.0 rc4
    qemu qemu 0.10.2
    qemu qemu 0.11.0-rc0
    qemu qemu 1.1
    qemu qemu 0.11.0-rc2
    qemu qemu 0.11.0-rc1
    qemu qemu 0.12.0
    qemu qemu 0.12.0 rc2
    qemu qemu 0.12.1
    qemu qemu 0.12.3
    qemu qemu 0.11.0 rc1
    qemu qemu 0.12.2
    qemu qemu 0.9.1-5
    qemu qemu 0.11.1
    qemu qemu 0.11.0 rc2
    qemu qemu 0.11.0 rc0
    redhat enterprise linux 6
    redhat enterprise linux 6
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6