CVE-2016-7909

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.

References

http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.html

http://www.openwall.com/lists/oss-security/2016/10/03/3

http://www.openwall.com/lists/oss-security/2016/10/03/6

http://www.securityfocus.com/bid/93275

https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html

https://lists.gnu.org/archive/html/qemu-devel/2016-09/msg07942.html

https://security.gentoo.org/glsa/201611-11

Details

Source: MITRE

Published: 2016-10-05

Updated: 2020-11-10

Type: CWE-835

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 4.4

Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 0.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.7.1 (inclusive)

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Tenable Plugins

View all (24 total)

IDNameProductFamilySeverity
135559EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2020-1430)NessusHuawei Local Security Checks
critical
131585EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2019-2431)NessusHuawei Local Security Checks
critical
119310Debian DLA-1599-1 : qemu security updateNessusDebian Local Security Checks
critical
96782Fedora 24 : 2:qemu (2017-12394e2cc7)NessusFedora Local Security Checks
high
96677Fedora 25 : 2:qemu (2017-b953d4d3a4)NessusFedora Local Security Checks
high
96253openSUSE Security Update : xen (openSUSE-2017-5)NessusSuSE Local Security Checks
high
96252openSUSE Security Update : xen (openSUSE-2017-4)NessusSuSE Local Security Checks
high
96150SUSE SLES11 Security Update : xen (SUSE-SU-2016:3273-1)NessusSuSE Local Security Checks
high
96129openSUSE Security Update : qemu (openSUSE-2016-1504)NessusSuSE Local Security Checks
critical
96032SUSE SLES11 Security Update : xen (SUSE-SU-2016:3174-1)NessusSuSE Local Security Checks
high
95910openSUSE Security Update : xen (openSUSE-2016-1477)NessusSuSE Local Security Checks
high
95822SUSE SLES12 Security Update : xen (SUSE-SU-2016:3156-1)NessusSuSE Local Security Checks
high
95761SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:3083-1)NessusSuSE Local Security Checks
high
95757openSUSE Security Update : qemu (openSUSE-2016-1451)NessusSuSE Local Security Checks
critical
95709SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:3067-1)NessusSuSE Local Security Checks
high
95624SUSE SLES11 Security Update : xen (SUSE-SU-2016:3044-1)NessusSuSE Local Security Checks
high
95537SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2988-1)NessusSuSE Local Security Checks
critical
95396SUSE SLES12 Security Update : qemu (SUSE-SU-2016:2936-1)NessusSuSE Local Security Checks
critical
95316SUSE SLES11 Security Update : kvm (SUSE-SU-2016:2902-1)NessusSuSE Local Security Checks
critical
95283SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2016:2879-1)NessusSuSE Local Security Checks
critical
95018GLSA-201611-11 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
94669Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : qemu, qemu-kvm vulnerabilities (USN-3125-1)NessusUbuntu Local Security Checks
critical
94519Debian DLA-698-1 : qemu security updateNessusDebian Local Security Checks
medium
94411Debian DLA-689-1 : qemu-kvm security updateNessusDebian Local Security Checks
medium