CVE-2016-5338Out-of-bounds Write in Qemu

CWE-787Out-of-bounds Write13 documents7 sources
Severity
7.8HIGHNVD
OSV6.7
EPSS
0.1%
top 75.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 14
Latest updateMay 13

Description

The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.6+dfsg-2 (bookworm)
Debianqemu/qemu< 1:2.6+dfsg-2+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.26+3
NVDqemu/qemu2.6.2

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04

Patches

🔴Vulnerability Details

4
GHSA
GHSA-g4j5-678q-qp7j: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp2022-05-13
OSV
qemu, qemu-kvm regression2016-08-12
OSV
qemu, qemu-kvm vulnerabilities2016-08-04
OSV
CVE-2016-5338: The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp2016-06-14

📋Vendor Advisories

4
Ubuntu
QEMU regression2016-08-12
Ubuntu
QEMU vulnerabilities2016-08-04
Red Hat
Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO2016-05-30
Debian
CVE-2016-5338: qemu - The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU al...2016

💬Community

2
Bugzilla
CVE-2016-5338 Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO2016-06-07
Bugzilla
CVE-2016-5338 Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO [fedora-all]2016-06-07