CVE-2016-5403

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.

References

http://xenbits.xen.org/xsa/advisory-184.html

https://bugzilla.redhat.com/show_bug.cgi?id=1358359

http://www.securityfocus.com/bid/92148

http://www.securitytracker.com/id/1036476

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.ubuntu.com/usn/USN-3047-1

http://www.ubuntu.com/usn/USN-3047-2

http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

http://rhn.redhat.com/errata/RHSA-2016-1654.html

http://rhn.redhat.com/errata/RHSA-2016-1653.html

http://rhn.redhat.com/errata/RHSA-2016-1655.html

http://rhn.redhat.com/errata/RHSA-2016-1652.html

http://rhn.redhat.com/errata/RHSA-2016-1763.html

http://rhn.redhat.com/errata/RHSA-2016-1607.html

http://rhn.redhat.com/errata/RHSA-2016-1606.html

http://rhn.redhat.com/errata/RHSA-2016-1756.html

http://rhn.redhat.com/errata/RHSA-2016-1586.html

http://rhn.redhat.com/errata/RHSA-2016-1585.html

http://rhn.redhat.com/errata/RHSA-2016-1943.html

https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html

Details

Source: MITRE

Published: 2016-08-02

Updated: 2021-08-04

Type: CWE-400

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 2

OR

cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*

cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*

cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:x86:*

Configuration 3

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.6.0 (inclusive)

cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

Tenable Plugins

View all (35 total)

IDNameProductFamilySeverity
129105Debian DLA-1927-1 : qemu security updateNessusDebian Local Security Checks
high
117312RHEL 7 : qemu-kvm-rhev (RHSA-2016:1607)NessusRed Hat Local Security Checks
high
99082OracleVM 3.4 : qemu-kvm (OVMSA-2017-0055)NessusOracleVM Local Security Checks
critical
94758SUSE SLES12 Security Update : qemu (SUSE-SU-2016:2781-1)NessusSuSE Local Security Checks
high
94669Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : qemu, qemu-kvm vulnerabilities (USN-3125-1)NessusUbuntu Local Security Checks
critical
94608SUSE SLES11 Security Update : xen (SUSE-SU-2016:2725-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94309openSUSE Security Update : qemu (openSUSE-2016-1234)NessusSuSE Local Security Checks
high
94283SUSE SLES11 Security Update : kvm (SUSE-SU-2016:2628-1)NessusSuSE Local Security Checks
high
94277SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2589-1)NessusSuSE Local Security Checks
high
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93794Scientific Linux Security Update : kvm on SL5.x x86_64 (20160927)NessusScientific Linux Local Security Checks
high
93778CentOS 5 : kvm (CESA-2016:1943)NessusCentOS Local Security Checks
high
93764RHEL 5 : kvm (RHSA-2016:1943)NessusRed Hat Local Security Checks
high
93760Oracle Linux 5 : kvm (ELSA-2016-1943)NessusOracle Linux Local Security Checks
high
93298SUSE SLES11 Security Update : xen (SUSE-SU-2016:2100-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
93296SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2093-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
92998Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20160811)NessusScientific Linux Local Security Checks
high
92966Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : qemu, qemu-kvm regression (USN-3047-2)NessusUbuntu Local Security Checks
high
92951CentOS 7 : qemu-kvm (CESA-2016:1606)NessusCentOS Local Security Checks
high
92939RHEL 7 : qemu-kvm (RHSA-2016:1606)NessusRed Hat Local Security Checks
high
92935Oracle Linux 7 : qemu-kvm (ELSA-2016-1606)NessusOracle Linux Local Security Checks
high
92859Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20160809)NessusScientific Linux Local Security Checks
medium
92855RHEL 6 : qemu-kvm-rhev (RHSA-2016:1586)NessusRed Hat Local Security Checks
medium
92854OracleVM 3.4 : qemu-kvm (OVMSA-2016-0096)NessusOracleVM Local Security Checks
medium
92837RHEL 6 : qemu-kvm (RHSA-2016:1585)NessusRed Hat Local Security Checks
medium
92835Oracle Linux 6 : qemu-kvm (ELSA-2016-1585)NessusOracle Linux Local Security Checks
medium
92826CentOS 6 : qemu-kvm (CESA-2016:1585)NessusCentOS Local Security Checks
medium
92796Fedora 23 : xen (2016-0049aa6e5d) (Bunker Buster)NessusFedora Local Security Checks
high
92766Fedora 24 : xen (2016-01cc766201) (Bunker Buster)NessusFedora Local Security Checks
high
92751Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : qemu, qemu-kvm vulnerabilities (USN-3047-1)NessusUbuntu Local Security Checks
high
92676FreeBSD : xen-tools -- virtio: unbounded memory allocation issue (06574c62-5854-11e6-b334-002590263bf5)NessusFreeBSD Local Security Checks
medium
92637Debian DLA-573-1 : qemu security updateNessusDebian Local Security Checks
high
92004Debian DLA-574-1 : qemu-kvm security updateNessusDebian Local Security Checks
high