CVE-2017-5526

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.

References

http://git.qemu-project.org/?p=qemu.git;a=commit;h=069eb7b2b8fc47c7cb52e5a4af23ea98d939e3da

http://www.openwall.com/lists/oss-security/2017/01/18/1

http://www.openwall.com/lists/oss-security/2017/01/18/8

http://www.securityfocus.com/bid/95669

https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html

Details

Source: MITRE

Published: 2017-03-15

Updated: 2020-11-10

Type: CWE-401

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Impact Score: 4

Exploitability Score: 2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.8.1.1 (inclusive)

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Tenable Plugins

View all (21 total)

IDNameProductFamilySeverity
138009EulerOS Virtualization 3.0.6.0 : qemu-kvm (EulerOS-SA-2020-1790)NessusHuawei Local Security Checks
critical
137489EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2020-1647)NessusHuawei Local Security Checks
high
134555EulerOS Virtualization for ARM 64 3.0.2.0 : qemu-kvm (EulerOS-SA-2020-1266)NessusHuawei Local Security Checks
high
117351Debian DLA-1497-1 : qemu security update (Spectre)NessusDebian Local Security Checks
critical
104349openSUSE Security Update : xen (openSUSE-2017-1239)NessusSuSE Local Security Checks
high
104255SUSE SLES12 Security Update : xen (SUSE-SU-2017:2873-1)NessusSuSE Local Security Checks
high
104252SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2017:2864-1)NessusSuSE Local Security Checks
high
104209SUSE SLES12 Security Update : xen (SUSE-SU-2017:2856-1)NessusSuSE Local Security Checks
high
104099SUSE SLES11 Security Update : xen (SUSE-SU-2017:2815-1)NessusSuSE Local Security Checks
high
104098SUSE SLES11 Security Update : xen (SUSE-SU-2017:2812-1)NessusSuSE Local Security Checks
high
104085openSUSE Security Update : xen (openSUSE-2017-1181)NessusSuSE Local Security Checks
high
103919SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2017:2751-1)NessusSuSE Local Security Checks
medium
100232openSUSE Security Update : qemu (openSUSE-2017-589)NessusSuSE Local Security Checks
critical
100149SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2017:1241-1)NessusSuSE Local Security Checks
critical
99581Ubuntu 14.04 LTS / 16.04 LTS / 16.10 : qemu vulnerabilities (USN-3261-1)NessusUbuntu Local Security Checks
critical
97865Fedora 24 : 2:qemu (2017-62ac1230f7)NessusFedora Local Security Checks
critical
97804Fedora 25 : 2:qemu (2017-31b976672b)NessusFedora Local Security Checks
critical
97791openSUSE Security Update : qemu (openSUSE-2017-349)NessusSuSE Local Security Checks
critical
97599SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2017:0625-1)NessusSuSE Local Security Checks
critical
97430Fedora 24 : xen (2017-d4ee7018c1)NessusFedora Local Security Checks
critical
97179Fedora 25 : xen (2017-cdb53b04e0)NessusFedora Local Security Checks
critical