CVE-2016-9922

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.

References

http://git.qemu-project.org/?p=qemu.git;a=commit;h=4299b90e9ba9ce5ca9024572804ba751aa1a7e70

http://www.openwall.com/lists/oss-security/2016/12/09/1

http://www.securityfocus.com/bid/94803

https://access.redhat.com/errata/RHSA-2017:2392

https://access.redhat.com/errata/RHSA-2017:2408

https://bugzilla.redhat.com/show_bug.cgi?id=1334398

https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html

https://lists.gnu.org/archive/html/qemu-devel/2016-12/msg00442.html

Details

Source: MITRE

Published: 2017-03-27

Updated: 2020-11-10

Type: CWE-369

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
117351Debian DLA-1497-1 : qemu security update (Spectre)NessusDebian Local Security Checks
critical
104780SUSE SLES11 Security Update : kvm (SUSE-SU-2017:3084-1)NessusSuSE Local Security Checks
critical
102158RHEL 7 : qemu-kvm-rhev (RHSA-2017:2392)NessusRed Hat Local Security Checks
high
100232openSUSE Security Update : qemu (openSUSE-2017-589)NessusSuSE Local Security Checks
critical
100149SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2017:1241-1)NessusSuSE Local Security Checks
critical
99758SUSE SLES11 Security Update : kvm (SUSE-SU-2017:1135-1)NessusSuSE Local Security Checks
critical
99581Ubuntu 14.04 LTS / 16.04 LTS / 16.10 : qemu vulnerabilities (USN-3261-1)NessusUbuntu Local Security Checks
critical
97828SUSE SLES11 Security Update : xen (SUSE-SU-2017:0718-1)NessusSuSE Local Security Checks
critical
97791openSUSE Security Update : qemu (openSUSE-2017-349)NessusSuSE Local Security Checks
critical
97712openSUSE Security Update : xen (openSUSE-2017-329)NessusSuSE Local Security Checks
critical
97696SUSE SLES12 Security Update : qemu (SUSE-SU-2017:0661-1)NessusSuSE Local Security Checks
critical
97657SUSE SLES11 Security Update : xen (SUSE-SU-2017:0647-1)NessusSuSE Local Security Checks
critical
97599SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2017:0625-1)NessusSuSE Local Security Checks
critical
97467SUSE SLES12 Security Update : xen (SUSE-SU-2017:0582-1)NessusSuSE Local Security Checks
critical
97433SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2017:0571-1)NessusSuSE Local Security Checks
critical
97432SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2017:0570-1)NessusSuSE Local Security Checks
critical
96623openSUSE Security Update : qemu (openSUSE-2017-116)NessusSuSE Local Security Checks
high
96529SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2017:0127-1)NessusSuSE Local Security Checks
high
96113Fedora 24 : xen (2016-bcbae0781f)NessusFedora Local Security Checks
high
96100Debian DLA-765-1 : qemu-kvm security updateNessusDebian Local Security Checks
medium
96099Debian DLA-764-1 : qemu security updateNessusDebian Local Security Checks
medium
96025Fedora 23 : xen (2016-cc2916dcf4)NessusFedora Local Security Checks
high