CVE-2020-15863Out-of-bounds Write in Qemu

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 68.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 28
Latest updateMay 24

Description

hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:LExploitability: 1.1 | Impact: 3.7

Affected Packages2 packages

Debianqemu/qemu< 1:5.0-12+3
NVDqemu/qemu5.0.0+1

Also affects: Debian Linux 10.0, Ubuntu Linux 16.04, 18.04, 20.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-65x8-3j2p-m8x9: hw/net/xgmac2022-05-24
OSV
CVE-2020-15863: hw/net/xgmac2020-07-28
CVEList
CVE-2020-15863: hw/net/xgmac2020-07-28

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2020-08-19
Microsoft
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest u2020-07-14
Red Hat
QEMU: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c2020-07-10
Debian
CVE-2020-15863: qemu - hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a ...2020

💬Community

4
Bugzilla
CVE-2020-15863 qemu: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c [fedora-all]2020-07-21
Bugzilla
CVE-2020-15863 xen: QEMU: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c [fedora-all]2020-07-21
Bugzilla
CVE-2020-15863 qemu: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c [epel-7]2020-07-21
Bugzilla
CVE-2020-15863 QEMU: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c2020-07-03
CVE-2020-15863 — Out-of-bounds Write in Qemu | cvebase