Vulnerability Name: | CVE-2017-9310 (CCN-127182) | ||||||||||||||||
Assigned: | 2017-05-19 | ||||||||||||||||
Published: | 2017-05-19 | ||||||||||||||||
Updated: | 2020-11-10 | ||||||||||||||||
Summary: | QEMU (aka Quick Emulator), when built with the e1000e NIC emulation support, allows local guest OS privileged users to cause a denial of service (infinite loop) via vectors related to setting the initial receive / transmit descriptor head (TDH/RDH) outside the allocated descriptor buffer. | ||||||||||||||||
CVSS v3 Severity: | 5.6 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H) 4.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 1.9 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-835 | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-9310 Source: CCN Type: QEMU GIT Repository net: e1000e: fix an infinite loop issue Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory http://git.qemu.org/?p=qemu.git;a=commitdiff;h=4154c7e03fa55b4cf52509a83d50d6c09d743b7 Source: DEBIAN Type: Third Party Advisory DSA-3920 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20170531 CVE-2017-9310 Qemu: net: infinite loop in e1000e NIC emulation Source: BID Type: Third Party Advisory, VDB Entry 98766 Source: CCN Type: BID-98766 QEMU CVE-2017-9310 Denial of Service Vulnerability Source: REDHAT Type: Third Party Advisory RHSA-2017:2392 Source: REDHAT Type: Third Party Advisory RHSA-2017:2408 Source: CCN Type: Red Hat Bugzilla Bug 1452620 (CVE-2017-9310) CVE-2017-9310 Qemu: net: infinite loop in e1000e NIC emulation Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1452620 Source: XF Type: UNKNOWN qemu-cve20179310-dos(127182) Source: GENTOO Type: Third Party Advisory GLSA-201706-03 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |