CVE-2016-6888Integer Overflow or Wraparound in Qemu

Severity
4.4MEDIUMNVD
EPSS
0.1%
top 73.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 10
Latest updateMay 13

Description

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6

Affected Packages4 packages

Debianqemu/qemu< 1:2.6+dfsg-3.1+3
NVDqemu/qemu2.6.2+1
NVDredhat/openstack6 versions+5

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-fxc3-452x-46r5: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt2022-05-13
OSV
CVE-2016-6888: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt2016-12-10
CVEList
CVE-2016-6888: Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt2016-12-10
OSV
qemu, qemu-kvm vulnerabilities2016-11-09

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2016-11-09
Red Hat
Qemu: net: vmxnet: integer overflow in packet initialisation2016-08-09
Debian
CVE-2016-6888: qemu - Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU ...2016

💬Community

2
Bugzilla
CVE-2016-6888 Qemu: net: vmxnet: integer overflow in packet initialisation [fedora-all]2016-08-22
Bugzilla
CVE-2016-6888 Qemu: net: vmxnet: integer overflow in packet initialisation2016-08-22
CVE-2016-6888 — Integer Overflow or Wraparound in Qemu | cvebase