CVE-2017-9503

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.

References

http://www.openwall.com/lists/oss-security/2017/06/08/1

http://www.securityfocus.com/bid/99010

https://bugzilla.redhat.com/show_bug.cgi?id=1459477

https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html

https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html

https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html

https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html

Details

Source: MITRE

Published: 2017-06-16

Updated: 2020-11-10

Type: CWE-476

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.9.1 (inclusive)

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
138911Debian DLA-2288-1 : qemu security updateNessusDebian Local Security Checks
medium
136276EulerOS Virtualization for ARM 64 3.0.2.0 : qemu-kvm (EulerOS-SA-2020-1573)NessusHuawei Local Security Checks
critical
130689EulerOS 2.0 SP5 : qemu-kvm (EulerOS-SA-2019-2227)NessusHuawei Local Security Checks
critical
117351Debian DLA-1497-1 : qemu security update (Spectre)NessusDebian Local Security Checks
critical
104780SUSE SLES11 Security Update : kvm (SUSE-SU-2017:3084-1)NessusSuSE Local Security Checks
critical
104495SUSE SLES12 Security Update : qemu (SUSE-SU-2017:2969-1)NessusSuSE Local Security Checks
critical
104494SUSE SLES11 Security Update : kvm (SUSE-SU-2017:2963-1)NessusSuSE Local Security Checks
critical
104471SUSE SLES12 Security Update : qemu (SUSE-SU-2017:2946-1)NessusSuSE Local Security Checks
critical
103372Ubuntu 14.04 LTS / 16.04 LTS / 17.04 : qemu regression (USN-3414-2)NessusUbuntu Local Security Checks
critical
103217Ubuntu 14.04 LTS / 16.04 LTS / 17.04 : qemu vulnerabilities (USN-3414-1)NessusUbuntu Local Security Checks
critical
101758openSUSE Security Update : qemu (openSUSE-2017-822)NessusSuSE Local Security Checks
critical
101350SUSE SLES12 Security Update : xen (SUSE-SU-2017:1812-1)NessusSuSE Local Security Checks
critical
101293SUSE SLES12 Security Update : xen (SUSE-SU-2017:1795-1)NessusSuSE Local Security Checks
critical
101227SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2017:1774-1)NessusSuSE Local Security Checks
critical
101224SUSE SLES11 Security Update : xen (SUSE-SU-2017:1770-1)NessusSuSE Local Security Checks
high