CVE-2015-8613 — Out-of-bounds Write in Qemu
Severity
6.5MEDIUMNVD
OSV6.0
EPSS
0.1%
top 72.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 11
Latest updateMay 13
Description
Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0
Affected Packages4 packages
Also affects: Debian Linux 8.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-62p4-wgww-h3qr: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest↗2022-05-13
OSV▶
CVE-2015-8613: Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest↗2017-04-11
📋Vendor Advisories
4Debian▶
CVE-2015-8613: qemu - Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when ...↗2015
💬Community
3Bugzilla
▶
Bugzilla▶
CVE-2015-8613 xen: qemu: Stack-based buffer overflow in megasas_ctrl_get_info [fedora-all]↗2015-12-21