Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1714

Опубликовано: 07 апр. 2016
Источник: debian
EPSS Низкий

Описание

The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.5+dfsg-4package
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1296060

  • Upstream fix: https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html

  • https://www.openwall.com/lists/oss-security/2016/01/11/7

  • fw_cfg support for guest-side data writes removed in 2.4 (1:2.4+dfsg-1a)

  • http://git.qemu.org/?p=qemu.git;a=commit;h=023e3148567ac898c7258138f8e86c3c2bb40d07 (v2.4.0-rc0)

  • fw_cfg_read removed in: http://git.qemu.org/?p=qemu.git;a=commit;h=6c8d56a2e95712a6206a2671d2b04b2e59cabc0b

EPSS

Процентиль: 37%
0.00158
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 9 лет назад

The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.

redhat
больше 9 лет назад

The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.

CVSS3: 8.1
nvd
больше 9 лет назад

The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.

CVSS3: 8.1
github
больше 3 лет назад

The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.

oracle-oval
больше 9 лет назад

ELSA-2016-0083: qemu-kvm security and bug fix update (IMPORTANT)

EPSS

Процентиль: 37%
0.00158
Низкий