ID CVE-2015-8817
Summary QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
References
Vulnerable Configurations
  • cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 12-02-2023 - 23:15)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2016:2670
  • rhsa
    id RHSA-2016:2671
  • rhsa
    id RHSA-2016:2704
  • rhsa
    id RHSA-2016:2705
  • rhsa
    id RHSA-2016:2706
rpms
  • qemu-img-rhev-10:2.6.0-27.el7
  • qemu-kvm-common-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-debuginfo-10:2.6.0-27.el7
  • qemu-kvm-tools-rhev-10:2.6.0-27.el7
  • qemu-img-rhev-10:2.6.0-27.el7
  • qemu-kvm-common-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-debuginfo-10:2.6.0-27.el7
  • qemu-kvm-tools-rhev-10:2.6.0-27.el7
  • qemu-img-rhev-10:2.6.0-27.el7
  • qemu-kvm-common-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-debuginfo-10:2.6.0-27.el7
  • qemu-kvm-tools-rhev-10:2.6.0-27.el7
  • qemu-img-rhev-10:2.6.0-27.el7
  • qemu-kvm-common-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-debuginfo-10:2.6.0-27.el7
  • qemu-kvm-tools-rhev-10:2.6.0-27.el7
  • qemu-img-rhev-10:2.6.0-27.el7
  • qemu-kvm-common-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-10:2.6.0-27.el7
  • qemu-kvm-rhev-debuginfo-10:2.6.0-27.el7
  • qemu-kvm-tools-rhev-10:2.6.0-27.el7
refmap via4
confirm
mlist
  • [oss-security] 20160301 CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
  • [oss-security] 20160301 Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation fault
  • [qemu-stable] 20160127 [PATCH for v2.3.1] exec: Respect as_translate_internal length clamp
Last major update 12-02-2023 - 23:15
Published 29-12-2016 - 22:59
Last modified 12-02-2023 - 23:15
Back to Top