CVE-2016-3710

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.

References

http://rhn.redhat.com/errata/RHSA-2016-0724.html

http://rhn.redhat.com/errata/RHSA-2016-0725.html

http://rhn.redhat.com/errata/RHSA-2016-0997.html

http://rhn.redhat.com/errata/RHSA-2016-0999.html

http://rhn.redhat.com/errata/RHSA-2016-1000.html

http://rhn.redhat.com/errata/RHSA-2016-1001.html

http://rhn.redhat.com/errata/RHSA-2016-1002.html

http://rhn.redhat.com/errata/RHSA-2016-1019.html

http://rhn.redhat.com/errata/RHSA-2016-1943.html

http://support.citrix.com/article/CTX212736

http://www.debian.org/security/2016/dsa-3573

http://www.openwall.com/lists/oss-security/2016/05/09/3

http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/90316

http://www.securitytracker.com/id/1035794

http://www.ubuntu.com/usn/USN-2974-1

http://xenbits.xen.org/xsa/advisory-179.html

https://access.redhat.com/errata/RHSA-2016:1224

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862

https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html

Details

Source: MITRE

Published: 2016-05-11

Updated: 2020-05-14

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Impact Score: 6

Exploitability Score: 2

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*

cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 4

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.5.1 (inclusive)

cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc4:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*

cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:x86:*

cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:x86:*

cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:* versions up to 7.0 (inclusive)

Configuration 7

OR

cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:8.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Tenable Plugins

View all (42 total)

IDNameProductFamilySeverity
117311RHEL 7 : qemu-kvm-rhev (RHSA-2016:0725)NessusRed Hat Local Security Checks
high
99082OracleVM 3.4 : qemu-kvm (OVMSA-2017-0055)NessusOracleVM Local Security Checks
critical
94608SUSE SLES11 Security Update : xen (SUSE-SU-2016:2725-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94267SUSE SLES11 Security Update : xen (SUSE-SU-2016:2528-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93794Scientific Linux Security Update : kvm on SL5.x x86_64 (20160927)NessusScientific Linux Local Security Checks
high
93778CentOS 5 : kvm (CESA-2016:1943)NessusCentOS Local Security Checks
high
93764RHEL 5 : kvm (RHSA-2016:1943)NessusRed Hat Local Security Checks
high
93760Oracle Linux 5 : kvm (ELSA-2016-1943)NessusOracle Linux Local Security Checks
high
93298SUSE SLES11 Security Update : xen (SUSE-SU-2016:2100-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93296SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2093-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93180SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1785-1)NessusSuSE Local Security Checks
critical
93170SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1703-1)NessusSuSE Local Security Checks
critical
93169SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1698-1)NessusSuSE Local Security Checks
critical
92635Debian DLA-571-1 : xen security update (Bunker Buster)NessusDebian Local Security Checks
high
92601OracleVM 3.3 : xen (OVMSA-2016-0089)NessusOracleVM Local Security Checks
high
92201Fedora 23 : 2:qemu (2016-f2b1f07256)NessusFedora Local Security Checks
high
92198Fedora 23 : xen (2016-f1c21e3c3c)NessusFedora Local Security Checks
high
92135Fedora 22 : 2:qemu (2016-a3298e39f7)NessusFedora Local Security Checks
high
92134Fedora 24 : xen (2016-a21b2cb7a0)NessusFedora Local Security Checks
high
92127Fedora 22 : xen (2016-8fd9019541)NessusFedora Local Security Checks
high
91980openSUSE Security Update : qemu (openSUSE-2016-839)NessusSuSE Local Security Checks
critical
91938FreeBSD : xen-tools -- QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks (e6ce6f50-4212-11e6-942d-bc5ff45d0f28)NessusFreeBSD Local Security Checks
high
91920Debian DLA-540-1 : qemu security updateNessusDebian Local Security Checks
high
91919Debian DLA-539-1 : qemu-kvm security updateNessusDebian Local Security Checks
high
91756OracleVM 3.2 : xen (OVMSA-2016-0081)NessusOracleVM Local Security Checks
high
91660SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1)NessusSuSE Local Security Checks
critical
91632RHEL 6 : qemu-kvm-rhev (RHSA-2016:1224)NessusRed Hat Local Security Checks
high
91542Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20160510)NessusScientific Linux Local Security Checks
high
91352Citrix XenServer Multiple Vulnerabilities (CTX212736)NessusMisc.
critical
91316OracleVM 3.4 : qemu-kvm (OVMSA-2016-0051)NessusOracleVM Local Security Checks
critical
91211Oracle Linux 6 : qemu-kvm (ELSA-2016-0997)NessusOracle Linux Local Security Checks
high
91172CentOS 6 : qemu-kvm (CESA-2016:0997)NessusCentOS Local Security Checks
high
91122Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2974-1)NessusUbuntu Local Security Checks
critical
91042Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20160509)NessusScientific Linux Local Security Checks
high
91038RHEL 6 : qemu-kvm (RHSA-2016:0997)NessusRed Hat Local Security Checks
high
91035RHEL 7 : qemu-kvm (RHSA-2016:0724)NessusRed Hat Local Security Checks
high
91031Oracle Linux 7 : qemu-kvm (ELSA-2016-0724)NessusOracle Linux Local Security Checks
high
91025Debian DSA-3573-1 : qemu - security updateNessusDebian Local Security Checks
high
91019CentOS 7 : qemu-kvm (CESA-2016:0724)NessusCentOS Local Security Checks
high