CVE-2015-2756Qemu vulnerability

CWE-2649 documents7 sources
Severity
4.9MEDIUMNVD
OSV8.6
EPSS
0.1%
top 69.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1
Latest updateMay 14

Description

QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS vector

AV:L/AC:L/C:N/I:N/A:CExploitability: 3.9 | Impact: 6.9

Affected Packages6 packages

debiandebian/qemu< qemu 1:2.3+dfsg-3 (bookworm)
Debianqemu/qemu< 1:2.3+dfsg-3+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.11
debiandebian/xen< qemu 1:2.3+dfsg-3 (bookworm)
Debianxen/xen< 4.2.0~rc2-1+3

Also affects: Debian Linux 7.0, 8.0, Fedora 20, 21, Ubuntu Linux 12.04, 14.04, 14.10, 15.04

🔴Vulnerability Details

3
GHSA
GHSA-vw92-7fxg-964r: QEMU, as used in Xen 32022-05-14
OSV
qemu, qemu-kvm vulnerabilities2015-05-13
OSV
CVE-2015-2756: QEMU, as used in Xen 32015-04-01

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2015-05-13
Red Hat
xen: unmediated PCI command register access in qemu (xsa126)2015-03-31
Debian
CVE-2015-2756: qemu - QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to P...2015

💬Community

2
Bugzilla
CVE-2015-2756 xen: unmediated PCI command register access in qemu (xsa126) [fedora-all]2015-03-31
Bugzilla
CVE-2015-2756 xen: unmediated PCI command register access in qemu (xsa126)2015-03-19