Vulnerability Name:

CVE-2017-9310 (CCN-127182)

Assigned:2017-05-19
Published:2017-05-19
Updated:2020-11-10
Summary:QEMU (aka Quick Emulator), when built with the e1000e NIC emulation support, allows local guest OS privileged users to cause a denial of service (infinite loop) via vectors related to setting the initial receive / transmit descriptor head (TDH/RDH) outside the allocated descriptor buffer.
CVSS v3 Severity:5.6 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H)
4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H)
4.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
3.8 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-835
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2017-9310

Source: CCN
Type: QEMU GIT Repository
net: e1000e: fix an infinite loop issue

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4154c7e03fa55b4cf52509a83d50d6c09d743b7

Source: DEBIAN
Type: Third Party Advisory
DSA-3920

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20170531 CVE-2017-9310 Qemu: net: infinite loop in e1000e NIC emulation

Source: BID
Type: Third Party Advisory, VDB Entry
98766

Source: CCN
Type: BID-98766
QEMU CVE-2017-9310 Denial of Service Vulnerability

Source: REDHAT
Type: Third Party Advisory
RHSA-2017:2392

Source: REDHAT
Type: Third Party Advisory
RHSA-2017:2408

Source: CCN
Type: Red Hat Bugzilla – Bug 1452620
(CVE-2017-9310) CVE-2017-9310 Qemu: net: infinite loop in e1000e NIC emulation

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1452620

Source: XF
Type: UNKNOWN
qemu-cve20179310-dos(127182)

Source: GENTOO
Type: Third Party Advisory
GLSA-201706-03

Vulnerable Configuration:Configuration 1:
  • cpe:/a:qemu:qemu:*:*:*:*:*:*:*:* (Version <= 2.8.1.1)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:qemu:qemu:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20179310000
    V
    CVE-2017-9310 on Ubuntu 14.04 LTS (trusty) - low.
    2017-06-08
    oval:com.ubuntu.xenial:def:20179310000
    V
    CVE-2017-9310 on Ubuntu 16.04 LTS (xenial) - low.
    2017-06-08
    oval:com.ubuntu.xenial:def:201793100000000
    V
    CVE-2017-9310 on Ubuntu 16.04 LTS (xenial) - low.
    2017-06-08
    BACK
    qemu qemu *
    debian debian linux 8.0
    debian debian linux 9.0
    qemu qemu *