Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-17380

Опубликовано: 30 янв. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6
CVSS3: 6.3

Описание

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.

РелизСтатусПримечание
bionic

released

1:2.11+dfsg-1ubuntu7.34
devel

released

1:5.2+dfsg-2ubuntu1
esm-infra-legacy/trusty

needed

esm-infra/bionic

released

1:2.11+dfsg-1ubuntu7.34
esm-infra/focal

released

1:4.2-3ubuntu6.10
esm-infra/xenial

released

1:2.5+dfsg-5ubuntu10.48
focal

released

1:4.2-3ubuntu6.10
groovy

released

1:5.0-5ubuntu9.2
hirsute

released

1:5.2+dfsg-2ubuntu1
impish

released

1:5.2+dfsg-2ubuntu1

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

EPSS

Процентиль: 21%
0.0007
Низкий

4.6 Medium

CVSS2

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.7
redhat
больше 5 лет назад

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.

CVSS3: 6.3
nvd
около 5 лет назад

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.

CVSS3: 6.3
msrc
около 5 лет назад

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host resulting in a denial of service condition or potentially execute arbitrary code with privileges of the QEMU process on the host.

CVSS3: 6.3
debian
около 5 лет назад

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SD ...

CVSS3: 6.3
github
больше 3 лет назад

A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.

EPSS

Процентиль: 21%
0.0007
Низкий

4.6 Medium

CVSS2

6.3 Medium

CVSS3