IP header length checking flaw in QEMU - #VU318

 

IP header length checking flaw in QEMU - #VU318

Published: August 16, 2016 / Updated: March 19, 2018


Vulnerability identifier: #VU318
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-200
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: QEMU
Affected software:
QEMU

Detailed vulnerability description

The vulnerability allows a local user to obtain potentially sensitive information.

The vulnerability exists due improper check of IP header length values. A local user can obtain potentially sensitive information on the target system.
Systems with VMWARE VMXNET3 NIC device support are affected.

Successful exploitation of this vulnerability may result in disclosure of system information.

Remediation

Patch for this vulnerability is available at:
https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html

Sources