CVE-2020-14364 | Date: (C)2020-09-01 (M)2024-04-19 |
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 5.0 | CVSS Score : 4.4 |
Exploit Score: 0.8 | Exploit Score: 3.4 |
Impact Score: 3.7 | Impact Score: 6.4 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: LOCAL | Access Vector: LOCAL |
Attack Complexity: HIGH | Access Complexity: MEDIUM |
Privileges Required: HIGH | Authentication: NONE |
User Interaction: NONE | Confidentiality: PARTIAL |
Scope: CHANGED | Integrity: PARTIAL |
Confidentiality: LOW | Availability: PARTIAL |
Integrity: LOW | |
Availability: LOW | |
| |