CVE-2016-6351Classic Buffer Overflow in Qemu

Severity
6.7MEDIUMNVD
EPSS
0.2%
top 62.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 7
Latest updateMay 13

Description

The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.6+dfsg-3.1 (bookworm)
Debianqemu/qemu< 1:2.6+dfsg-3.1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.26+3
NVDqemu/qemu2.6.2

Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04

🔴Vulnerability Details

4
GHSA
GHSA-f7gh-f5wg-p6m2: The esp_do_dma function in hw/scsi/esp2022-05-13
OSV
CVE-2016-6351: The esp_do_dma function in hw/scsi/esp2016-09-07
OSV
qemu, qemu-kvm regression2016-08-12
OSV
qemu, qemu-kvm vulnerabilities2016-08-04

📋Vendor Advisories

4
Ubuntu
QEMU regression2016-08-12
Ubuntu
QEMU vulnerabilities2016-08-04
Red Hat
Qemu: scsi: esp: OOB write access in esp_do_dma2016-06-15
Debian
CVE-2016-6351: qemu - The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when buil...2016

💬Community

2
Bugzilla
CVE-2016-6351 Qemu: scsi: esp: OOB write access in esp_do_dma2016-07-27
Bugzilla
CVE-2016-6351 Qemu: scsi: esp: OOB write access in esp_do_dma [fedora-all]2016-07-27