Vulnerability CVE-2020-16092


Published: 2020-08-11

Description:
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
QEMU -> QEMU 

 References:
http://www.openwall.com/lists/oss-security/2020/08/10/1
https://lists.nongnu.org/archive/html/qemu-devel/2020-07/msg07563.html

Copyright 2020, cxsecurity.com

 

Back to Top