CVE-2016-2858

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

QEMU, when built with the Pseudo Random Number Generator (PRNG) back-end support, allows local guest OS users to cause a denial of service (process crash) via an entropy request, which triggers arbitrary stack based allocation and memory corruption.

References

http://git.qemu.org/?p=qemu.git;a=commit;h=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956

http://www.openwall.com/lists/oss-security/2016/03/04/1

http://www.openwall.com/lists/oss-security/2016/03/07/4

http://www.securityfocus.com/bid/84134

http://www.ubuntu.com/usn/USN-2974-1

https://bugzilla.redhat.com/show_bug.cgi?id=1314676

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

https://security.gentoo.org/glsa/201604-01

Details

Source: MITRE

Published: 2016-04-07

Updated: 2020-10-15

Type: CWE-331

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Impact Score: 4

Exploitability Score: 2

Severity: MEDIUM

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
135154EulerOS Virtualization for ARM 64 3.0.6.0 : qemu-kvm (EulerOS-SA-2020-1367)NessusHuawei Local Security Checks
high
131585EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2019-2431)NessusHuawei Local Security Checks
critical
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
93180SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1785-1)NessusSuSE Local Security Checks
critical
93170SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1703-1)NessusSuSE Local Security Checks
critical
93169SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1698-1)NessusSuSE Local Security Checks
critical
92201Fedora 23 : 2:qemu (2016-f2b1f07256)NessusFedora Local Security Checks
high
92135Fedora 22 : 2:qemu (2016-a3298e39f7)NessusFedora Local Security Checks
high
92081Fedora 24 : xen (2016-389be30b95)NessusFedora Local Security Checks
medium
92059Fedora 23 : xen (2016-103752d2a9)NessusFedora Local Security Checks
high
91980openSUSE Security Update : qemu (openSUSE-2016-839)NessusSuSE Local Security Checks
critical
91660SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1)NessusSuSE Local Security Checks
critical
91122Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2974-1)NessusUbuntu Local Security Checks
critical
90339GLSA-201604-01 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
90045Fedora 23 : xen-4.5.2-9.fc23 (2016-f4504e9445)NessusFedora Local Security Checks
high
90036Fedora 22 : xen-4.5.2-9.fc22 (2016-38b20aa50f)NessusFedora Local Security Checks
high