CVE-2015-8701

medium

Description

QEMU (aka Quick Emulator) built with the Rocker switch emulation support is vulnerable to an off-by-one error. It happens while processing transmit (tx) descriptors in 'tx_consume' routine, if a descriptor was to have more than allowed (ROCKER_TX_FRAGS_MAX=16) fragments. A privileged user inside guest could use this flaw to cause memory leakage on the host or crash the QEMU process instance resulting in DoS issue.

References

http://www.openwall.com/lists/oss-security/2015/12/28/6

http://www.openwall.com/lists/oss-security/2015/12/29/1

http://www.securityfocus.com/bid/79706

https://bugzilla.redhat.com/show_bug.cgi?id=1286971

https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg04629.html

https://security.gentoo.org/glsa/201602-01

Details

Source: MITRE

Published: 2016-12-29

Updated: 2020-11-10

Type: CWE-193

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Impact Score: 4

Exploitability Score: 2

Severity: MEDIUM