Vulnerability Name:

CVE-2021-3409 (CCN-197944)

Assigned:2021-03-09
Published:2021-03-09
Updated:2022-09-30
Summary:The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
CVSS v3 Severity:5.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L)
5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
5.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L)
5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-3409

Source: MISC
Type: Issue Tracking, Patch, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1928146

Source: XF
Type: UNKNOWN
qemu-cve20213409-bo(197944)

Source: MLIST
Type: Third Party Advisory
[debian-lts-announce] 20210410 [SECURITY] [DLA 2623-1] qemu security update

Source: CCN
Type: qemu-devel Web site
[RESEND PATCH v3 0/5] hw/sd: sdhci: Fixes to CVE-2020-17380, CVE-2020-25

Source: CCN
Type: oss-sec Mailing List, Tue, 9 Mar 2021 09:56:16 +0100
CVE-2021-3409 QEMU: sdhci: incomplete fix for CVE-2020-17380/CVE-2020-25085

Source: GENTOO
Type: Third Party Advisory
GLSA-202208-27

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20210507-0001/

Source: MISC
Type: Mailing List, Patch, Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/03/09/1

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2021-3409

Vulnerable Configuration:Configuration 1:
  • cpe:/a:qemu:qemu:*:*:*:*:*:*:*:* (Version <= 5.2.0)

  • Configuration 2:
  • cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:fedoraproject:fedora:33:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:qemu:qemu:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:8034
    P
    libpcp-devel-5.2.5-150400.5.3.11 on GA media (Moderate)
    2023-06-20
    oval:org.opensuse.security:def:7791
    P
    qemu-tools-7.1.0-150500.47.15 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:651
    P
    Security update for qemu (Important) (in QA)
    2022-10-04
    oval:org.opensuse.security:def:719
    P
    Security update for gstreamer-plugins-good (Important)
    2022-08-31
    oval:org.opensuse.security:def:3620
    P
    Security update for xen (Important)
    2022-07-06
    oval:org.opensuse.security:def:3518
    P
    guile-2.0.9-9.3.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:3187
    P
    libidn-tools-1.28-5.6.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94817
    P
    qemu-tools-6.2.0-150400.35.10 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:95148
    P
    qemu-6.2.0-150400.35.10 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:351
    P
    qemu-6.2.0-150400.35.10 on GA media (Moderate)
    2022-06-10
    oval:org.opensuse.security:def:6053
    P
    Security update for postgresql13 (Important)
    2022-05-25
    oval:org.opensuse.security:def:111576
    P
    Security update for qemu (Important)
    2021-07-11
    oval:org.opensuse.security:def:64709
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:97059
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:67142
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:1611
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:73831
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:69123
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:76210
    P
    Security update for qemu (Important)
    2021-06-10
    oval:org.opensuse.security:def:101450
    P
    Security update for qemu (Important)
    2021-06-10
    BACK
    qemu qemu *
    redhat enterprise linux 7.0
    fedoraproject fedora 33
    debian debian linux 9.0
    qemu qemu -