Vulnerability Details : CVE-2015-8817
QEMU (aka Quick Emulator) built to use 'address_space_translate' to map an address to a MemoryRegionSection is vulnerable to an OOB r/w access issue. It could occur while doing pci_dma_read/write calls. Affects QEMU versions >= 1.6.0 and <= 2.3.1. A privileged user inside guest could use this flaw to crash the guest instance resulting in DoS.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2015-8817
- cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:2.3.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8817
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8817
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2015-8817
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8817
-
http://rhn.redhat.com/errata/RHSA-2016-2670.html
RHSA-2016:2670 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2016/03/01/1
oss-security - CVE request Qemu: OOB access in address_space_rw leads to segmentation faultMailing List;Patch
-
http://rhn.redhat.com/errata/RHSA-2016-2705.html
RHSA-2016:2705 - Security Advisory - Red Hat Customer Portal
-
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=23820dbfc79d1c9dce090b4c555994f2bb6a69b3
git.qemu.org Git
-
https://lists.gnu.org/archive/html/qemu-stable/2016-01/msg00060.html
[Qemu-stable] [PATCH for v2.3.1] exec: Respect as_translate_internal lenMailing List
-
http://rhn.redhat.com/errata/RHSA-2016-2671.html
RHSA-2016:2671 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2016-2706.html
RHSA-2016:2706 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2016/03/01/10
oss-security - Re: CVE request Qemu: OOB access in address_space_rw leads to segmentation faultMailing List;Patch
-
https://bugzilla.redhat.com/show_bug.cgi?id=1300771
1300771 – (CVE-2015-8817, CVE-2015-8818) CVE-2015-8817 CVE-2015-8818 Qemu: OOB access in address_space_rw leads to segmentation faultIssue Tracking
-
http://rhn.redhat.com/errata/RHSA-2016-2704.html
RHSA-2016:2704 - Security Advisory - Red Hat Customer Portal
-
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c3c1bb99d1c11978d9ce94d1bdcf0705378c1459
git.qemu.org Git
Jump to