CVE-2016-7161

CRITICAL
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.

References

http://git.qemu.org/?p=qemu.git;a=commit;h=a0d1cbdacff5df4ded16b753b38fdd9da6092968

http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html

http://www.openwall.com/lists/oss-security/2016/09/23/6

http://www.openwall.com/lists/oss-security/2016/09/23/8

http://www.securityfocus.com/bid/93141

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01598.html

https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg01877.html

https://security.gentoo.org/glsa/201611-11

Details

Source: MITRE

Published: 2016-10-05

Updated: 2020-11-16

Type: CWE-787

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
130689EulerOS 2.0 SP5 : qemu-kvm (EulerOS-SA-2019-2227)NessusHuawei Local Security Checks
critical
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
96129openSUSE Security Update : qemu (openSUSE-2016-1504)NessusSuSE Local Security Checks
critical
95757openSUSE Security Update : qemu (openSUSE-2016-1451)NessusSuSE Local Security Checks
critical
95537SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2988-1)NessusSuSE Local Security Checks
critical
95396SUSE SLES12 Security Update : qemu (SUSE-SU-2016:2936-1)NessusSuSE Local Security Checks
critical
95316SUSE SLES11 Security Update : kvm (SUSE-SU-2016:2902-1)NessusSuSE Local Security Checks
critical
95283SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2879-1)NessusSuSE Local Security Checks
critical
95018GLSA-201611-11 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
94827Fedora 25 : xen (2016-81e5a36d8c)NessusFedora Local Security Checks
critical
94669Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : qemu, qemu-kvm vulnerabilities (USN-3125-1)NessusUbuntu Local Security Checks
critical
94122Fedora 24 : 2:qemu (2016-a56fb613a8)NessusFedora Local Security Checks
critical
94059Fedora 23 : xen (2016-689f240960)NessusFedora Local Security Checks
critical
94058Fedora 24 : xen (2016-4c407cd849)NessusFedora Local Security Checks
critical
93970Debian DLA-653-1 : qemu-kvm security updateNessusDebian Local Security Checks
critical
93969Debian DLA-652-1 : qemu security updateNessusDebian Local Security Checks
critical