cve-2019-20175
Vulnerability from cvelistv5
Published
2019-12-31 03:27
Modified
2024-08-05 02:39
Severity ?
EPSS score ?
Summary
An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a "privileged guest user has many ways to cause similar DoS effect, without triggering this assert.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2019-20175", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-26T19:35:51.638983Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-26T19:36:00.122Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-05T02:39:09.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mail-archive.com/qemu-devel%40nongnu.org/msg667396.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a \"privileged guest user has many ways to cause similar DoS effect, without triggering this assert." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-31T03:27:40", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.mail-archive.com/qemu-devel%40nongnu.org/msg667396.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-20175", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a \"privileged guest user has many ways to cause similar DoS effect, without triggering this assert.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html", "refsource": "MISC", "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html" }, { "name": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html", "refsource": "MISC", "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html" }, { "name": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html", "refsource": "MISC", "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html" }, { "name": "https://www.mail-archive.com/qemu-devel@nongnu.org/msg667396.html", "refsource": "MISC", "url": "https://www.mail-archive.com/qemu-devel@nongnu.org/msg667396.html" }, { "name": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html", "refsource": "MISC", "url": "https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-20175", "datePublished": "2019-12-31T03:27:40", "dateReserved": "2019-12-31T00:00:00", "dateUpdated": "2024-08-05T02:39:09.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-20175\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-12-31T04:15:10.503\",\"lastModified\":\"2024-11-21T04:38:09.763\",\"vulnStatus\":\"Modified\",\"cveTags\":[{\"sourceIdentifier\":\"cve@mitre.org\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in ide_dma_cb() in hw/ide/core.c in QEMU 2.4.0 through 4.2.0. The guest system can crash the QEMU process in the host system via a special SCSI_IOCTL_SEND_COMMAND. It hits an assertion that implies that the size of successful DMA transfers there must be a multiple of 512 (the size of a sector). NOTE: a member of the QEMU security team disputes the significance of this issue because a \\\"privileged guest user has many ways to cause similar DoS effect, without triggering this assert.\"},{\"lang\":\"es\",\"value\":\"** EN DISPUTA ** Se descubri\u00f3 un problema en la funci\u00f3n ide_dma_cb() en el archivo hw/ide/core.c en QEMU versiones 2.4.0 hasta la versi\u00f3n 4.2.0. El sistema invitado puede bloquear el proceso de QEMU en el sistema host por medio de un SCSI_IOCTL_SEND_COMMAND especial. Llega a una afirmaci\u00f3n que implica que el tama\u00f1o de las transferencias DMA con \u00e9xito debe ser un m\u00faltiplo de 512 (el tama\u00f1o de un sector). NOTA: un miembro del equipo de seguridad de QEMU cuestiona la relevancia de este problema ya que un \\\"usuario invitado privilegiado cuenta con muchas formas de causar un efecto de DoS similar, sin activar esta afirmaci\u00f3n\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"4.2.0\",\"matchCriteriaId\":\"912FF889-84EA-4A17-9B8A-E7998531016C\"}]}]}],\"references\":[{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.mail-archive.com/qemu-devel%40nongnu.org/msg667396.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg01651.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-07/msg03869.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg00597.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.nongnu.org/archive/html/qemu-devel/2019-11/msg02165.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.mail-archive.com/qemu-devel%40nongnu.org/msg667396.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.