CVE-2020-13253 — Out-of-bounds Read in Qemu
Severity
5.5MEDIUMNVD
OSV6.5
EPSS
0.1%
top 69.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 27
Latest updateMay 24
Description
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6
Patches
🔴Vulnerability Details
5📋Vendor Advisories
5Microsoft▶
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.↗2020-05-12
Debian▶
CVE-2020-13253: qemu - sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads ...↗2020
💬Community
3Bugzilla▶
CVE-2020-13253 xen: QEMU: sd: OOB access could crash the guest resulting in DoS [fedora-all]↗2020-05-21
Bugzilla
▶