CVE-2016-1922
Debian Security Advisory 3470-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
QEMU (también conocido como Quick Emulator) construido con el soporte de invitados TPR optimization for 32-bit Windows es vulnerable a una falla de referencia puntero null. Ocurre mientras se hacen operaciones de escritura de puerto I/O a través de interfaz hmp. En eso, 'current_cpu' permanece null, lo que lleva a una referencia de puntero null. Un usuario o proceso podría usar esta falla para bloquear la instancia QEMU, resultando en un problema DoS.
Qinghao Tang discovered that QEMU incorrectly handled PCI MSI-X support. An attacker inside the guest could use this issue to cause QEMU to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. Lian Yihan discovered that QEMU incorrectly handled the VNC server. A remote attacker could use this issue to cause QEMU to crash, resulting in a denial of service. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-01-16 CVE Reserved
- 2016-02-03 CVE Published
- 2024-08-05 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/01/16/1 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2016/01/16/6 | Mailing List |
|
http://www.securityfocus.com/bid/81058 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=1283934 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html | 2020-11-10 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2016/dsa-3469 | 2020-11-10 | |
http://www.debian.org/security/2016/dsa-3470 | 2020-11-10 | |
http://www.debian.org/security/2016/dsa-3471 | 2020-11-10 | |
https://security.gentoo.org/glsa/201604-01 | 2020-11-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 2.5.1.1 Search vendor "Qemu" for product "Qemu" and version " <= 2.5.1.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|