The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
http://www.openwall.com/lists/oss-security/2015/09/04/4
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
http://www.ubuntu.com/usn/USN-2745-1
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
http://www.openwall.com/lists/oss-security/2015/09/05/5
https://bugzilla.redhat.com/show_bug.cgi?id=1260076
https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
Source: MITRE
Published: 2020-01-31
Updated: 2021-11-30
Type: CWE-835
Base Score: 2.7
Vector: AV:A/AC:L/Au:S/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 5.1
Severity: LOW
Base Score: 3.5
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Impact Score: 1.4
Exploitability Score: 2.1
Severity: LOW