CVE-2020-10756
Severity
6.5MEDIUM
EPSS
0.0%
top 93.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 9
Latest updateApr 12
Description
An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 2.0 | Impact: 4.0
Affected Packages9 packages
Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04, 20.04, Enterprise Linux 7.0, 8.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
6Microsoft▶
It was discovered that the update for the virt:rhel module in the RHSA-2020:4676 (https://access.redhat.com/errata/RHSA-2020:4676) erratum released as part of Red Hat Enterprise Linux 8.3 failed to in↗2022-04-12
Red Hat▶
QEMU: Regression of CVE-2020-10756 fix in virt:rhel/qemu-kvm in Red Hat Enterprise Linux 8.3↗2020-05-27
💬Community
4Bugzilla▶
CVE-2020-10756 libslirp: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [epel-8]↗2020-06-01
Bugzilla▶
CVE-2020-10756 libslirp: QEMU: slirp: networking out-of-bounds read information disclosure vulnerability [fedora-all]↗2020-06-01
Bugzilla▶
CVE-2020-10756 qemu: slirp: networking out-of-bounds read information disclosure vulnerability [fedora-all]↗2020-06-01
Bugzilla▶
CVE-2020-10756 QEMU: slirp: networking out-of-bounds read information disclosure vulnerability↗2020-05-14