Vulnerability Name: | CVE-2021-3507 (CCN-201362) | ||||||||||||||||||
Assigned: | 2021-04-19 | ||||||||||||||||||
Published: | 2021-04-19 | ||||||||||||||||||
Updated: | 2023-02-12 | ||||||||||||||||||
Summary: | A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory. | ||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:U/RC:R)
6.3 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:U/RC:R)
4.1 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||||||||
CVSS v2 Severity: | 3.6 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P)
| ||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3507 Source: CCN Type: Red Hat Bugzilla - Bug 1951118 (CVE-2021-3507) - CVE-2021-3507 QEMU: fdc: heap buffer overflow in DMA read data transfers Source: secalert@redhat.com Type: Exploit, Issue Tracking, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN qemu-cve20213507-dos(201362) Source: secalert@redhat.com Type: Mailing List, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: QEMU Web site QEMU | ||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |