Vulnerability CVE-2020-15859


Published: 2020-07-21

Description:
QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.

Type:

CWE-416

(Use After Free)

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
QEMU -> QEMU 

 References:
https://bugs.launchpad.net/qemu/+bug/1886362
https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05304.html
https://www.openwall.com/lists/oss-security/2020/07/21/3

Copyright 2020, cxsecurity.com

 

Back to Top