CVE-2020-25723 — Reachable Assertion in Qemu
Severity
3.2LOWNVD
OSV6.3
EPSS
0.0%
top 89.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 2
Latest updateMay 24
Description
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:LExploitability: 1.5 | Impact: 1.4
Affected Packages6 packages
Also affects: Debian Linux 10.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
4Microsoft▶
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged use↗2020-12-08
Debian▶
CVE-2020-25723: qemu - A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It...↗2020