[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-3346Date: (C)2015-12-16   (M)2023-12-22


Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.0
Exploit Score: 1.9
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: HIGH
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
RHSA-2011:1401
http://www.openwall.com/lists/oss-security/2011/10/20/2
http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
https://bugzilla.redhat.com/show_bug.cgi?id=736038
https://github.com/bonzini/qemu/commit/103b40f51e4012b3b0ad20f615562a1806d7f49a
https://github.com/bonzini/qemu/commit/7285477ab11831b1cf56e45878a89170dd06d9b9

CPE    5
cpe:/o:redhat:enterprise_linux:5
cpe:/a:qemu:qemu:0.15.0:rc1
cpe:/a:qemu:qemu:0.15.0:rc2
cpe:/a:qemu:qemu
...
CWE    1
CWE-119
OVAL    3
oval:org.secpod.oval:def:201494
oval:org.secpod.oval:def:201469
oval:org.secpod.oval:def:500244

© SecPod Technologies