CVE-2016-5238

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.

References

http://www.openwall.com/lists/oss-security/2016/06/02/2

http://www.openwall.com/lists/oss-security/2016/06/02/9

http://www.securityfocus.com/bid/90995

http://www.ubuntu.com/usn/USN-3047-1

http://www.ubuntu.com/usn/USN-3047-2

https://bugzilla.redhat.com/show_bug.cgi?id=1341931

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg05691.html

https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg00150.html

https://security.gentoo.org/glsa/201609-01

Details

Source: MITRE

Published: 2016-06-14

Updated: 2020-10-21

Type: CWE-787

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 4.4

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 0.8

Severity: MEDIUM

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
94758SUSE SLES12 Security Update : qemu (SUSE-SU-2016:2781-1)NessusSuSE Local Security Checks
high
94608SUSE SLES11 Security Update : xen (SUSE-SU-2016:2725-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94309openSUSE Security Update : qemu (openSUSE-2016-1234)NessusSuSE Local Security Checks
high
94283SUSE SLES11 Security Update : kvm (SUSE-SU-2016:2628-1)NessusSuSE Local Security Checks
high
94277SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2589-1)NessusSuSE Local Security Checks
high
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94267SUSE SLES11 Security Update : xen (SUSE-SU-2016:2528-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93697GLSA-201609-01 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
93298SUSE SLES11 Security Update : xen (SUSE-SU-2016:2100-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93296SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2093-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
92966Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : qemu, qemu-kvm regression (USN-3047-2)NessusUbuntu Local Security Checks
high
92751Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-3047-1)NessusUbuntu Local Security Checks
high
92299Fedora 22 : 2:qemu (2016-ea3002b577)NessusFedora Local Security Checks
critical
92277Fedora 24 : 2:qemu (2016-a80eab65ba)NessusFedora Local Security Checks
critical
92255Fedora 23 : 2:qemu (2016-73853a7a16)NessusFedora Local Security Checks
critical
92081Fedora 24 : xen (2016-389be30b95)NessusFedora Local Security Checks
medium
92059Fedora 23 : xen (2016-103752d2a9)NessusFedora Local Security Checks
high