Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-14364

Опубликовано: 31 авг. 2020
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 4.4
CVSS3: 5

Описание

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

РелизСтатусПримечание
bionic

released

1:2.11+dfsg-1ubuntu7.32
devel

released

1:5.0-5ubuntu9
esm-infra-legacy/trusty

not-affected

2.0.0+dfsg-2ubuntu1.47+esm1
esm-infra/bionic

not-affected

1:2.11+dfsg-1ubuntu7.32
esm-infra/focal

not-affected

1:4.2-3ubuntu6.6
esm-infra/xenial

not-affected

1:2.5+dfsg-5ubuntu10.46
focal

released

1:4.2-3ubuntu6.6
groovy

released

1:5.0-5ubuntu9
hirsute

released

1:5.0-5ubuntu9
precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

precise/esm

ignored

end of life, was needed
trusty

DNE

trusty/esm

DNE

Показывать по

EPSS

Процентиль: 93%
0.11636
Средний

4.4 Medium

CVSS2

5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5
redhat
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVSS3: 5
nvd
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

CVSS3: 5
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 5
debian
почти 5 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator ...

CVSS3: 5
github
около 3 лет назад

An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.

EPSS

Процентиль: 93%
0.11636
Средний

4.4 Medium

CVSS2

5 Medium

CVSS3

Уязвимость CVE-2020-14364