Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-20203

Опубликовано: 25 фев. 2021
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1
CVSS3: 3.2

Описание

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

РелизСтатусПримечание
bionic

released

1:2.11+dfsg-1ubuntu7.39
devel

released

1:6.2+dfsg-2ubuntu5
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

1:2.11+dfsg-1ubuntu7.39
esm-infra/focal

not-affected

1:4.2-3ubuntu6.21
esm-infra/xenial

needed

focal

released

1:4.2-3ubuntu6.21
groovy

ignored

end of life
hirsute

ignored

end of life
impish

released

1:6.0+dfsg-2expubuntu1.2

Показывать по

EPSS

Процентиль: 3%
0.0002
Низкий

2.1 Low

CVSS2

3.2 Low

CVSS3

Связанные уязвимости

CVSS3: 3.2
redhat
больше 4 лет назад

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

CVSS3: 3.2
nvd
больше 4 лет назад

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

CVSS3: 3.2
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 3.2
debian
больше 4 лет назад

An integer overflow issue was found in the vmxnet3 NIC emulator of the ...

CVSS3: 3.2
github
около 3 лет назад

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.

EPSS

Процентиль: 3%
0.0002
Низкий

2.1 Low

CVSS2

3.2 Low

CVSS3