CVE-2016-6833

Published on: 12/09/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.

  • CVE-2016-6833 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 4.4 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 2.1 - LOW

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Qemu CVE-2016-6833 Use After Free Memory Denial of Service Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 93255
[Qemu-devel] [PULL 2/3] net: vmxnet3: check for device_active before wri Mailing List
Patch
Third Party Advisory
lists.gnu.org
text/x-diff
URL Logo MLIST [qemu-devel] 20160809 [PULL 2/3] net: vmxnet3: check for device_active before write
[SECURITY] [DLA 1497-1] qemu security update Mailing List
Third Party Advisory
lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
oss-security - CVE request: Qemu net: vmxnet3: use after free while writing Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160812 CVE request: Qemu net: vmxnet3: use after free while writing
oss-security - Re: CVE request: Qemu net: vmxnet3: use after free while writing Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160817 Re: CVE request: Qemu net: vmxnet3: use after free while writing
git.qemu.org Git - qemu.git/commit Patch
Vendor Advisory
git.qemu.org
text/xml
URL Logo CONFIRM git.qemu.org/?p=qemu.git;a=commit;h=6c352ca9b4ee3e1e286ea9e8434bd8e69ac7d0d8
QEMU: Multiple vulnerabilities (GLSA 201609-01) — Gentoo security Third Party Advisory
security.gentoo.org
text/html
URL Logo GENTOO GLSA-201609-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux8.0AllAllAll
Operating
System
DebianDebian Linux8.0AllAllAll
ApplicationQemuQemu2.7.0rc0AllAll
ApplicationQemuQemu2.7.0rc1AllAll
ApplicationQemuQemu2.7.0rc2AllAll
ApplicationQemuQemu2.7.0rc0AllAll
ApplicationQemuQemu2.7.0rc1AllAll
ApplicationQemuQemu2.7.0rc2AllAll
ApplicationQemuQemuAllAllAllAll
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:2.7.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:2.7.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*: