Vulnerability Name: | CVE-2011-2512 (CCN-68328) | ||||||||||||||||||||||||||||
Assigned: | 2011-05-08 | ||||||||||||||||||||||||||||
Published: | 2011-05-08 | ||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||
Summary: | The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P) 4.5 Medium (Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:W/RC:UR)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:W/RC:UR)
5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:A/AC:H/Au:S/C:C/I:C/A:C/E:U/RL:W/RC:UR)
| ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||
References: | Source: CCN Type: QEMU Web page QEMU Source: MITRE Type: CNA CVE-2011-2512 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Patchwork Web site virtio: guard against negative vq notifies Source: CCN Type: RHSA-2011-0919 Important: qemu-kvm security and bug fix update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: SA44458 Qemu PIIX4 Hotplug Vulnerability Source: CCN Type: SA44648 KVM qemu-kvm PIIX4 Hotplug Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: DEBIAN Type: DSA-2270 qemu-kvm -- programming error Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: secalert@redhat.com Type: Patch secalert@redhat.com Source: CCN Type: OSVDB ID: 74751 KVM qemu-kvm VirtIO Queue Notification Local Privilege Escalation Source: CCN Type: BID-48499 QEMU KVM 'virtio_queue_notify()' Local Privilege Escalation Vulnerability Source: XF Type: UNKNOWN qemu-virtio-code-execution(68328) Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |