CVE-2016-6835Heap-based Buffer Overflow in Qemu

Severity
6.0MEDIUMNVD
EPSS
0.1%
top 78.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 10
Latest updateMay 13

Description

The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:HExploitability: 1.5 | Impact: 4.0

Affected Packages3 packages

NVDqemu/qemu< 2.6.0
Debianqemu/qemu< 1:2.6+dfsg-3.1+3

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qv57-784w-q593: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt2022-05-13
OSV
CVE-2016-6835: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt2016-12-10
CVEList
CVE-2016-6835: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt2016-12-10

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2016-11-09
Red Hat
Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation2016-08-09
Debian
CVE-2016-6835: qemu - The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka ...2016

💬Community

2
Bugzilla
CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation [fedora-all]2016-08-22
Bugzilla
CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation2016-08-22
CVE-2016-6835 — Heap-based Buffer Overflow in Qemu | cvebase