Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2016

Опубликовано: 30 дек. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.9
CVSS3: 7.8

Описание

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

not-affected

1.5.0+dfsg-3ubuntu5
hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

ignored

end of life
saucy

not-affected

1.5.0+dfsg-3ubuntu5
upstream

released

1.5.0

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

0.12.3+noroms-0ubuntu9.21
oneiric

not-affected

0.14.1+noroms-0ubuntu6.6
precise

not-affected

1.0+noroms-0ubuntu14.8
quantal

not-affected

1.2.0+noroms-0ubuntu2.12.10.3
raring

DNE

saucy

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

oneiric

DNE

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

not-affected

Показывать по

EPSS

Процентиль: 22%
0.00074
Низкий

6.9 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

redhat
почти 13 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

CVSS3: 7.8
nvd
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

CVSS3: 7.8
debian
около 6 лет назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validat ...

CVSS3: 7.8
github
почти 4 года назад

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

suse-cvrf
больше 11 лет назад

Security update for kvm

EPSS

Процентиль: 22%
0.00074
Низкий

6.9 Medium

CVSS2

7.8 High

CVSS3