CVE-2016-4020

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).

References

https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html

https://bugzilla.redhat.com/show_bug.cgi?id=1313686

http://git.qemu.org/?p=qemu.git;a=commit;h=691a02e2ce0c413236a78dee6f2651c937b09fb0

https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html

http://www.ubuntu.com/usn/USN-2974-1

http://www.securityfocus.com/bid/86067

https://security.gentoo.org/glsa/201609-01

https://access.redhat.com/errata/RHSA-2017:2408

https://access.redhat.com/errata/RHSA-2017:2392

https://access.redhat.com/errata/RHSA-2017:1856

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

Details

Source: MITRE

Published: 2016-05-25

Updated: 2021-08-04

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Impact Score: 4

Exploitability Score: 2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.6.2 (inclusive)

Configuration 2

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 3

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:11:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Tenable Plugins

View all (25 total)

IDNameProductFamilySeverity
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
103082EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2017-1224)NessusHuawei Local Security Checks
high
103081EulerOS 2.0 SP1 : qemu-kvm (EulerOS-SA-2017-1223)NessusHuawei Local Security Checks
high
102737CentOS 7 : qemu-kvm (CESA-2017:1856)NessusCentOS Local Security Checks
medium
102655Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20170801)NessusScientific Linux Local Security Checks
medium
102284Oracle Linux 7 : qemu-kvm (ELSA-2017-1856)NessusOracle Linux Local Security Checks
medium
102158RHEL 7 : qemu-kvm-rhev (RHSA-2017:2392)NessusRed Hat Local Security Checks
high
102145RHEL 7 : qemu-kvm (RHSA-2017:1856)NessusRed Hat Local Security Checks
medium
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93697GLSA-201609-01 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
93298SUSE SLES11 Security Update : xen (SUSE-SU-2016:2100-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93296SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2093-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93180SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1785-1)NessusSuSE Local Security Checks
critical
93170SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1703-1)NessusSuSE Local Security Checks
critical
93169SUSE SLES11 Security Update : kvm (SUSE-SU-2016:1698-1)NessusSuSE Local Security Checks
critical
92637Debian DLA-573-1 : qemu security updateNessusDebian Local Security Checks
high
92197Fedora 24 : 2:qemu (2016-f13ea849c5)NessusFedora Local Security Checks
medium
92174Fedora 22 : 2:qemu (2016-d3a56228f5)NessusFedora Local Security Checks
medium
92056Fedora 23 : 2:qemu (2016-07eca37ea0)NessusFedora Local Security Checks
medium
92004Debian DLA-574-1 : qemu-kvm security updateNessusDebian Local Security Checks
high
91980openSUSE Security Update : qemu (openSUSE-2016-839)NessusSuSE Local Security Checks
critical
91660SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:1560-1)NessusSuSE Local Security Checks
critical
91122Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2974-1)NessusUbuntu Local Security Checks
critical