Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6833

Опубликовано: 10 дек. 2016
Источник: debian
EPSS Низкий

Описание

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.6+dfsg-3.1package
qemunot-affectedwheezypackage
qemu-kvmremovedpackage
qemu-kvmnot-affectedwheezypackage

Примечания

  • http://git.qemu.org/?p=qemu.git;a=commit;h=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8

  • Upstream patch: https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01602.html

  • https://www.openwall.com/lists/oss-security/2016/08/12/1

EPSS

Процентиль: 23%
0.00075
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
около 9 лет назад

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

CVSS3: 3.5
redhat
больше 9 лет назад

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

CVSS3: 4.4
nvd
около 9 лет назад

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

CVSS3: 4.4
github
больше 3 лет назад

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 23%
0.00075
Низкий