CVE-2016-4952
Ubuntu Security Notice USN-3047-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
QEMU (también conocido como Quick Emulator), cuando está construido con soporte de emulación bus VMWARE PVSCSI paravirtual SCSI, permite a administradores locales del SO invitado provocar una denegación de servicio (acceso al array fuera de rango) a través de vectores relacionados con el comando (1) PVSCSI_CMD_SETUP_RINGS o (2) PVSCSI_CMD_SETUP_MSG_RING SCSI.
Li Qiang discovered that QEMU incorrectly handled 53C9X Fast SCSI controller emulation. A privileged attacker inside the guest could use th is issue to cause QEMU to crash, resulting in a denial of service, or possibly execute arbitrary code on the host. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-05-23 CVE Reserved
- 2016-08-05 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2016/05/23/1 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2016/05/23/4 | Mailing List |
|
https://bugzilla.redhat.com/show_bug.cgi?id=1334384 | Issue Tracking | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03774.html | 2020-10-21 |
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-3047-1 | 2020-10-21 | |
http://www.ubuntu.com/usn/USN-3047-2 | 2020-10-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 2.6.2 Search vendor "Qemu" for product "Qemu" and version " <= 2.6.2" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|