CVE-2016-4001

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.

References

http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66

http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html

http://www.openwall.com/lists/oss-security/2016/04/11/4

http://www.openwall.com/lists/oss-security/2016/04/12/6

http://www.securityfocus.com/bid/85976

http://www.ubuntu.com/usn/USN-2974-1

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html

https://security.gentoo.org/glsa/201609-01

Details

Source: MITRE

Published: 2016-05-23

Updated: 2020-10-15

Type: CWE-120

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 8.6

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Impact Score: 4

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
131585EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2019-2431)NessusHuawei Local Security Checks
critical
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
94608SUSE SLES11 Security Update : xen (SUSE-SU-2016:2725-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94267SUSE SLES11 Security Update : xen (SUSE-SU-2016:2528-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93697GLSA-201609-01 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
93298SUSE SLES11 Security Update : xen (SUSE-SU-2016:2100-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93296SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2093-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93180SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1785-1)NessusSuSE Local Security Checks
critical
93170SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1703-1)NessusSuSE Local Security Checks
critical
93169SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1698-1)NessusSuSE Local Security Checks
critical
92201Fedora 23 : 2:qemu (2016-f2b1f07256)NessusFedora Local Security Checks
high
92135Fedora 22 : 2:qemu (2016-a3298e39f7)NessusFedora Local Security Checks
high
91980openSUSE Security Update : qemu (openSUSE-2016-839)NessusSuSE Local Security Checks
critical
91660SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1)NessusSuSE Local Security Checks
critical
91122Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2974-1)NessusUbuntu Local Security Checks
critical
90954Fedora 24 : xen-4.6.1-6.fc24 (2016-48e72b7bc5)NessusFedora Local Security Checks
critical
90814Fedora 22 : xen-4.5.3-2.fc22 (2016-75063477ca)NessusFedora Local Security Checks
critical
90811Fedora 23 : xen-4.5.3-2.fc23 (2016-35d7b09908)NessusFedora Local Security Checks
critical