[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-15863Date: (C)2020-07-29   (M)2024-04-19


hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.3CVSS Score : 4.4
Exploit Score: 1.1Exploit Score: 3.4
Impact Score: 3.7Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: PARTIAL
Integrity: LOW 
Availability: LOW 
  
Reference:
DSA-4760
GLSA-202208-27
USN-4467-1
http://www.openwall.com/lists/oss-security/2020/07/22/1
https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=5519724a13664b43e225ca05351c60b4468e4555
https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg03497.html
https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg05745.html
openSUSE-SU-2020:1664

CPE    3
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
cpe:/a:qemu:qemu
CWE    1
CWE-787
OVAL    17
oval:org.secpod.oval:def:66753
oval:org.secpod.oval:def:89050233
oval:org.secpod.oval:def:605007
oval:org.secpod.oval:def:89000222
...

© SecPod Technologies