Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-8817

Опубликовано: 29 дек. 2016
Источник: nvd
CVSS3: 5.5
CVSS2: 2.1
EPSS Низкий

Описание

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.3.1:*:*:*:*:*:*:*

EPSS

Процентиль: 26%
0.00088
Низкий

5.5 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 9 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

redhat
около 10 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

CVSS3: 5.5
debian
около 9 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to ma ...

CVSS3: 5.5
github
больше 3 лет назад

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

suse-cvrf
больше 9 лет назад

Security update for qemu

EPSS

Процентиль: 26%
0.00088
Низкий

5.5 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

CWE-125