CVE-2016-6888

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

References

http://www.securityfocus.com/bid/92556

http://git.qemu.org/?p=qemu.git;a=commit;h=47882fa4975bf0b58dd74474329fdd7154e8f04c

http://www.openwall.com/lists/oss-security/2016/08/19/6

https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03176.html

http://www.openwall.com/lists/oss-security/2016/08/19/10

https://security.gentoo.org/glsa/201609-01

https://access.redhat.com/errata/RHSA-2017:2408

https://access.redhat.com/errata/RHSA-2017:2392

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

Details

Source: MITRE

Published: 2016-12-10

Updated: 2021-08-04

Type: CWE-190

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 4.4

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 0.8

Severity: MEDIUM

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
131585EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2019-2431)NessusHuawei Local Security Checks
critical
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
102158RHEL 7 : qemu-kvm-rhev (RHSA-2017:2392)NessusRed Hat Local Security Checks
high
94758SUSE SLES12 Security Update : qemu (SUSE-SU-2016:2781-1)NessusSuSE Local Security Checks
high
94669Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : qemu, qemu-kvm vulnerabilities (USN-3125-1)NessusUbuntu Local Security Checks
critical
94309openSUSE Security Update : qemu (openSUSE-2016-1234)NessusSuSE Local Security Checks
high
94277SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2589-1)NessusSuSE Local Security Checks
high
94269SUSE SLES12 Security Update : xen (SUSE-SU-2016:2533-1) (Bunker Buster)NessusSuSE Local Security Checks
critical
94038SUSE SLES11 Security Update : xen (SUSE-SU-2016:2507-1) (Bunker Buster)NessusSuSE Local Security Checks
high
94000openSUSE Security Update : xen (openSUSE-2016-1170) (Bunker Buster)NessusSuSE Local Security Checks
critical
93999openSUSE Security Update : xen (openSUSE-2016-1169) (Bunker Buster)NessusSuSE Local Security Checks
critical
93935SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:2473-1) (Bunker Buster)NessusSuSE Local Security Checks
high
93697GLSA-201609-01 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical