CVE-2016-1714
Qemu: nvram: OOB r/w access in processing firmware configurations
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
Las funciones (1) fw_cfg_write y (2) fw_cfg_read en hw/nvram/fw_cfg.c en QEMU en versiones anteriores a 2.4, cuando construye con el soporte de emulación de dispositivo de Firmware Configuration, permiten a usuarios del SO invitado con el privilegio CAP_SYS_RAWIO provocar una denegación de servicio (acceso a lectura o escritura fuera de rango y caída del proceso) o potencialmente ejecutar código arbitrario a través de un valor de entrada actual no válido en una configuración de firmware.
An out-of-bounds read/write flaw was discovered in the way QEMU's Firmware Configuration device emulation processed certain firmware configurations. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-01-12 CVE Reserved
- 2016-01-28 CVE Published
- 2024-07-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-125: Out-of-bounds Read
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/01/11/7 | Mailing List | |
http://www.openwall.com/lists/oss-security/2016/01/12/10 | Mailing List | |
http://www.openwall.com/lists/oss-security/2016/01/12/11 | Mailing List | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html | Third Party Advisory | |
http://www.securityfocus.com/bid/80250 | Third Party Advisory | |
http://www.securitytracker.com/id/1034858 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2016-0081.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0082.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0083.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0084.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0085.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0086.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0087.html | 2023-02-12 | |
http://rhn.redhat.com/errata/RHSA-2016-0088.html | 2023-02-12 | |
http://www.debian.org/security/2016/dsa-3469 | 2023-02-12 | |
http://www.debian.org/security/2016/dsa-3470 | 2023-02-12 | |
http://www.debian.org/security/2016/dsa-3471 | 2023-02-12 | |
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html | 2023-02-12 | |
https://security.gentoo.org/glsa/201604-01 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2016-1714 | 2016-01-28 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1296060 | 2016-01-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Openstack Search vendor "Redhat" for product "Openstack" | 5.0 Search vendor "Redhat" for product "Openstack" and version "5.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Linux Search vendor "Oracle" for product "Linux" | 6 Search vendor "Oracle" for product "Linux" and version "6" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Linux Search vendor "Oracle" for product "Linux" | 7 Search vendor "Oracle" for product "Linux" and version "7" | - |
Affected
| ||||||
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 2.3.0 Search vendor "Qemu" for product "Qemu" and version " <= 2.3.0" | - |
Affected
|