CVE-2016-7423Out-of-bounds Write in Qemu

Severity
4.4MEDIUMNVD
OSV5.5
EPSS
0.1%
top 65.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 10
Latest updateMay 13

Description

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.7+dfsg-1 (bookworm)
Debianqemu/qemu< 1:2.7+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.30+1
NVDqemu/qemu2.7.1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-wv4v-cwg3-f8c9: The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest O2022-05-13
OSV
qemu, qemu-kvm vulnerabilities2016-11-09
OSV
CVE-2016-7423: The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest O2016-10-10

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2016-11-09
Red Hat
Qemu: scsi: mptsas: OOB access when freeing MPTSASRequest object2016-09-15
Debian
CVE-2016-7423: qemu - The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when b...2016

💬Community

2
Bugzilla
CVE-2016-7423 Qemu: scsi: mptsas: OOB access when freeing MPTSASRequest object2016-09-16
Bugzilla
CVE-2016-7423 Qemu: scsi: mptsas: OOB access when freeing MPTSASRequest object [fedora-all]2016-09-16