CVE-2015-8613Out-of-bounds Write in Qemu

Severity
6.5MEDIUMNVD
OSV6.0
EPSS
0.1%
top 72.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 11
Latest updateMay 13

Description

Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.5+dfsg-3 (bookworm)
Debianqemu/qemu< 1:2.5+dfsg-3+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.22
NVDqemu/qemu2.5.1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-62p4-wgww-h3qr: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest2022-05-13
OSV
CVE-2015-8613: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest2017-04-11
OSV
qemu, qemu-kvm vulnerabilities2016-02-03

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2016-02-03
Red Hat
Qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info2015-12-21
BSD
FreeBSD-SA-15:03.sctp: SCTP stream reset vulnerability2015-01-27
Debian
CVE-2015-8613: qemu - Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when ...2015

💬Community

3
Bugzilla
CVE-2015-8613 qemu: Stack-based buffer overflow in megasas_ctrl_get_info [fedora-all]2015-12-21
Bugzilla
CVE-2015-8613 xen: qemu: Stack-based buffer overflow in megasas_ctrl_get_info [fedora-all]2015-12-21
Bugzilla
CVE-2015-8613 Qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info2015-11-20