CVE-2016-6833Use After Free in Qemu

CWE-416Use After Free10 documents7 sources
Severity
4.4MEDIUMNVD
OSV5.5
EPSS
0.1%
top 77.55%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 10
Latest updateMay 13

Description

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.6+dfsg-3.1 (bookworm)
Debianqemu/qemu< 1:2.6+dfsg-3.1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.30+1
NVDqemu/qemu2.6.2+1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-78cx-qvrx-grfp: Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet32022-05-13
OSV
CVE-2016-6833: Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet32016-12-10
OSV
qemu, qemu-kvm vulnerabilities2016-11-09

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2016-11-09
Red Hat
Qemu: net: vmxnet3: use-after-free while writing to device2016-08-09
Red Hat
php: Invalid free() instead of efree() in phar_extract_file()2016-06-21
Debian
CVE-2016-6833: qemu - Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmx...2016

💬Community

2
Bugzilla
CVE-2016-6833 Qemu: net: vmxnet3: use-after-free while writing to device2016-08-22
Bugzilla
CVE-2016-6833 Qemu: net: vmxnet3: use-after-free while writing to device [fedora-all]2016-08-22