ID CVE-2017-5956
Summary The vrend_draw_vbo function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors involving vertext_buffer_index.
References
Vulnerable Configurations
  • cpe:2.3:a:virglrenderer_project:virglrenderer:0.5.0
    cpe:2.3:a:virglrenderer_project:virglrenderer:0.5.0
CVSS
Base: 2.1 (as of 22-03-2017 - 15:09)
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
refmap via4
bid 96187
confirm https://cgit.freedesktop.org/virglrenderer/commit/?id=a5ac49940c40ae415eac0cf912eac7070b4ba95d
gentoo GLSA-201707-06
mlist
  • [oss-security] 20170213 CVE-2017-5956 virglrenderer: Virglrenderer: OOB access while in vrend_draw_vbo
  • [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
Last major update 22-03-2017 - 15:51
Published 20-03-2017 - 12:59
Last modified 10-07-2017 - 21:33
Back to Top