Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-2016

Опубликовано: 30 дек. 2019
Источник: nvd
CVSS3: 7.8
CVSS2: 6.9
EPSS Низкий

Описание

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Версия от 1.3.0 (включая) до 1.4.2 (включая)
cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:novell:open_desktop_server:11.0:sp3:*:*:*:linux_kernel:*:*
cpe:2.3:a:novell:open_enterprise_server:11.0:sp3:*:*:*:linux_kernel:*:*

EPSS

Процентиль: 23%
0.00074
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

redhat
почти 13 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

CVSS3: 7.8
debian
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validat ...

CVSS3: 7.8
github
почти 4 года назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

suse-cvrf
больше 11 лет назад

Security update for kvm

EPSS

Процентиль: 23%
0.00074
Низкий

7.8 High

CVSS3

6.9 Medium

CVSS2

Дефекты

CWE-269