CVE-2016-1922
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
QEMU (también conocido como Quick Emulator) construido con el soporte de invitados TPR optimization for 32-bit Windows es vulnerable a una falla de referencia puntero null. Ocurre mientras se hacen operaciones de escritura de puerto I/O a través de interfaz hmp. En eso, 'current_cpu' permanece null, lo que lleva a una referencia de puntero null. Un usuario o proceso podría usar esta falla para bloquear la instancia QEMU, resultando en un problema DoS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-01-16 CVE Reserved
- 2016-02-03 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/01/16/1 | Mailing List | |
http://www.openwall.com/lists/oss-security/2016/01/16/6 | Mailing List | |
http://www.securityfocus.com/bid/81058 | Third Party Advisory | |
https://bugzilla.redhat.com/show_bug.cgi?id=1283934 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html | 2020-11-10 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2016/dsa-3469 | 2020-11-10 | |
http://www.debian.org/security/2016/dsa-3470 | 2020-11-10 | |
http://www.debian.org/security/2016/dsa-3471 | 2020-11-10 | |
https://security.gentoo.org/glsa/201604-01 | 2020-11-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 2.5.1.1 Search vendor "Qemu" for product "Qemu" and version " <= 2.5.1.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|