| Vulnerability Name: | CVE-2011-3346 (CCN-69685) | ||||||||||||||||||||||||
| Assigned: | 2011-09-07 | ||||||||||||||||||||||||
| Published: | 2011-09-07 | ||||||||||||||||||||||||
| Updated: | 2023-02-13 | ||||||||||||||||||||||||
| Summary: | Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. Note: this is only a vulnerability when root has manually modified certain permissions or ACLs. | ||||||||||||||||||||||||
| CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||
| CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C) 3.0 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.0 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||
| References: | Source: CCN Type: QEMU Web page QEMU Source: MITRE Type: CNA CVE-2011-3346 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: RHSA-2011-1401 Moderate: xen security and bug fix update Source: CCN Type: SA45886 Qemu "scsi_disk_emulate_command()" Denial of Service Weakness Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: OSVDB ID: 75279 Qemu hw/scsi-disk.c scsi_disk_emulate_command() Function Command Parsing Local Overflow DoS Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-49545 QEMU 'scsi_disk_emulate_command()' Function Local Denial of Service Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 736038 CVE-2011-3346 qemu: local DoS with SCSI CD-ROM Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: XF Type: UNKNOWN qemu-scsidiskemulatecommand-dos(69685) Source: secalert@redhat.com Type: Exploit, Patch secalert@redhat.com Source: secalert@redhat.com Type: Exploit, Patch secalert@redhat.com | ||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||