CVE-2015-8817Out-of-bounds Read in Qemu

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 75.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 29
Latest updateMay 14

Description

QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/qemu< qemu 1:2.4+dfsg-1a (bookworm)
Debianqemu/qemu< 1:2.4+dfsg-1a+3
NVDqemu/qemu14 versions+13

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v4mw-844w-rfcf: QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue2022-05-14
OSV
CVE-2015-8817: QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue2016-12-29

📋Vendor Advisories

2
Red Hat
Qemu: OOB access in address_space_rw leads to segmentation fault2016-01-27
Debian
CVE-2015-8817: qemu - QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an addre...2015

💬Community

1
Bugzilla
CVE-2015-8817 CVE-2015-8818 Qemu: OOB access in address_space_rw leads to segmentation fault2016-01-21