CVE-2016-3712

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.

References

http://rhn.redhat.com/errata/RHSA-2016-2585.html

http://rhn.redhat.com/errata/RHSA-2017-0621.html

http://support.citrix.com/article/CTX212736

http://www.debian.org/security/2016/dsa-3573

http://www.openwall.com/lists/oss-security/2016/05/09/4

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/90314

http://www.securitytracker.com/id/1035794

http://www.ubuntu.com/usn/USN-2974-1

http://xenbits.xen.org/xsa/advisory-179.html

https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html

Details

Source: MITRE

Published: 2016-05-11

Updated: 2020-05-14

Type: CWE-190

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:x86:*

cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:x86:*

Configuration 2

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.5.1 (inclusive)

cpe:2.3:a:qemu:qemu:2.6.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.6.0:rc4:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:* versions up to 7.0 (inclusive)

Tenable Plugins

View all (37 total)

IDNameProductFamilySeverity
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
127343NewStart CGSL MAIN 4.05 : qemu-kvm Multiple Vulnerabilities (NS-SA-2019-0108)NessusNewStart CGSL Local Security Checks
critical
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
99828EulerOS 2.0 SP1 : qemu-kvm (EulerOS-SA-2016-1066)NessusHuawei Local Security Checks
medium
99222Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20170321)NessusScientific Linux Local Security Checks
medium
99082OracleVM 3.4 : qemu-kvm (OVMSA-2017-0055)NessusOracleVM Local Security Checks
critical
99064Oracle Linux 6 : qemu-kvm (ELSA-2017-0621)NessusOracle Linux Local Security Checks
medium
97952CentOS 6 : qemu-kvm (CESA-2017:0621)NessusCentOS Local Security Checks
medium
97875RHEL 6 : qemu-kvm (RHSA-2017:0621)NessusRed Hat Local Security Checks
medium
95858Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20161103)NessusScientific Linux Local Security Checks
medium
95331CentOS 7 : qemu-kvm (CESA-2016:2585)NessusCentOS Local Security Checks
medium
94706Oracle Linux 7 : qemu-kvm (ELSA-2016-2585)NessusOracle Linux Local Security Checks
medium
94608SUSE SLES11 Security Update : xen (SUSE-SU-2016:2725-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94548RHEL 7 : qemu-kvm (RHSA-2016:2585)NessusRed Hat Local Security Checks
medium
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93180SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1785-1)NessusSuSE Local Security Checks
critical
93170SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1703-1)NessusSuSE Local Security Checks
critical
93169SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1698-1)NessusSuSE Local Security Checks
critical
92854OracleVM 3.4 : qemu-kvm (OVMSA-2016-0096)NessusOracleVM Local Security Checks
medium
92635Debian DLA-571-1 : xen security update (Bunker Buster)NessusDebian Local Security Checks
high
92601OracleVM 3.3 : xen (OVMSA-2016-0089)NessusOracleVM Local Security Checks
high
92201Fedora 23 : 2:qemu (2016-f2b1f07256)NessusFedora Local Security Checks
high
92198Fedora 23 : xen (2016-f1c21e3c3c)NessusFedora Local Security Checks
high
92135Fedora 22 : 2:qemu (2016-a3298e39f7)NessusFedora Local Security Checks
high
92134Fedora 24 : xen (2016-a21b2cb7a0)NessusFedora Local Security Checks
high
92127Fedora 22 : xen (2016-8fd9019541)NessusFedora Local Security Checks
high
91980openSUSE Security Update : qemu (openSUSE-2016-839)NessusSuSE Local Security Checks
critical
91938FreeBSD : xen-tools -- QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks (e6ce6f50-4212-11e6-942d-bc5ff45d0f28)NessusFreeBSD Local Security Checks
high
91920Debian DLA-540-1 : qemu security updateNessusDebian Local Security Checks
high
91919Debian DLA-539-1 : qemu-kvm security updateNessusDebian Local Security Checks
high
91756OracleVM 3.2 : xen (OVMSA-2016-0081)NessusOracleVM Local Security Checks
high
91660SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1)NessusSuSE Local Security Checks
critical
91352Citrix XenServer Multiple Vulnerabilities (CTX212736)NessusMisc.
critical
91122Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2974-1)NessusUbuntu Local Security Checks
critical
91025Debian DSA-3573-1 : qemu - security updateNessusDebian Local Security Checks
high