Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html
http://www.openwall.com/lists/oss-security/2016/04/11/4
http://www.openwall.com/lists/oss-security/2016/04/12/6
http://www.securityfocus.com/bid/85976
http://www.ubuntu.com/usn/USN-2974-1
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html
Source: MITRE
Published: 2016-05-23
Updated: 2020-10-15
Type: CWE-120
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Impact Score: 4
Exploitability Score: 3.9
Severity: HIGH
OR
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.5.1.1 (inclusive)
OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
OR
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
135559 | EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430) | Nessus | Huawei Local Security Checks | critical |
131585 | EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2019-2431) | Nessus | Huawei Local Security Checks | high |
119310 | Debian DLA-1599-1 : qemu security update | Nessus | Debian Local Security Checks | critical |
94608 | SUSE SLES11 Security Update : xen (SUSE-SU-2016:2725-1) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
94269 | SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
94267 | SUSE SLES11 Security Update : xen (SUSE-SU-2016:2528-1) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
94000 | openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
93999 | openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
93697 | GLSA-201609-01 : QEMU: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | medium |
93298 | SUSE SLES11 Security Update : xen (SUSE-SU-2016:2100-1) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
93296 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2093-1) (Bunker Buster) | Nessus | SuSE Local Security Checks | high |
93180 | SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1785-1) | Nessus | SuSE Local Security Checks | high |
93170 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1703-1) | Nessus | SuSE Local Security Checks | high |
93169 | SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1698-1) | Nessus | SuSE Local Security Checks | high |
92201 | Fedora 23 : 2:qemu (2016-f2b1f07256) | Nessus | Fedora Local Security Checks | high |
92135 | Fedora 22 : 2:qemu (2016-a3298e39f7) | Nessus | Fedora Local Security Checks | high |
91980 | openSUSE Security Update : qemu (openSUSE-2016-839) | Nessus | SuSE Local Security Checks | high |
91660 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1) | Nessus | SuSE Local Security Checks | high |
91122 | Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2974-1) | Nessus | Ubuntu Local Security Checks | high |
90954 | Fedora 24 : xen-4.6.1-6.fc24 (2016-48e72b7bc5) | Nessus | Fedora Local Security Checks | high |
90814 | Fedora 22 : xen-4.5.3-2.fc22 (2016-75063477ca) | Nessus | Fedora Local Security Checks | high |
90811 | Fedora 23 : xen-4.5.3-2.fc23 (2016-35d7b09908) | Nessus | Fedora Local Security Checks | high |