QEMU < 5.2.0-rc3 Heap Use-After-Free DoS (CVE-2020-28916)

medium Nessus Plugin ID 143479

Synopsis

The remote host has virtualization software installed that is affected by a denial of service vulnerability.

Description

The version of QEMU installed on the remote Windows host may be affected by a denial of service (DoS) vulnerability in the e1000e device emulator due to a heap use-after-free. An attacker can exploit this by sending packets to be received by e1000e_write_packet_to_guest() in order to induce a DoS.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to QEMU 5.2.0-rc3 or later.

See Also

https://www.openwall.com/lists/oss-security/2020/12/01/2

https://bugs.launchpad.net/qemu/+bug/1892978

Plugin Details

Severity: Medium

ID: 143479

File Name: qemu_win_5_2_rc3.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 12/4/2020

Updated: 2/7/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2020-28916

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:qemu:qemu

Required KB Items: Settings/ParanoidReport, installed_sw/QEMU

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/1/2020

Vulnerability Publication Date: 12/1/2020

Reference Information

CVE: CVE-2020-28916

IAVB: 2020-B-0075-S