CVE-2020-15863 — Out-of-bounds Write in Qemu
Severity
5.3MEDIUMNVD
EPSS
0.1%
top 68.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 28
Latest updateMay 24
Description
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:LExploitability: 1.1 | Impact: 3.7
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest u↗2020-07-14
Debian▶
CVE-2020-15863: qemu - hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a ...↗2020
💬Community
4Bugzilla▶
CVE-2020-15863 qemu: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c [fedora-all]↗2020-07-21
Bugzilla▶
CVE-2020-15863 xen: QEMU: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c [fedora-all]↗2020-07-21
Bugzilla▶
CVE-2020-15863 qemu: stack-based overflow in xgmac_enet_send() in hw/net/xgmac.c [epel-7]↗2020-07-21
Bugzilla
▶