IP header length checking flaw in QEMU - #VU318
Published: August 16, 2016 / Updated: March 19, 2018
Vulnerability identifier: #VU318
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-200
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: QEMU
Affected software:
QEMU
QEMU
Detailed vulnerability description
The vulnerability allows a local user to obtain potentially sensitive information.
The vulnerability exists due improper check of IP header length values. A local user can obtain potentially sensitive information on the target system.
Systems with VMWARE VMXNET3 NIC device support are affected.
Successful exploitation of this vulnerability may result in disclosure of system information.
The vulnerability exists due improper check of IP header length values. A local user can obtain potentially sensitive information on the target system.
Systems with VMWARE VMXNET3 NIC device support are affected.
Successful exploitation of this vulnerability may result in disclosure of system information.
Remediation
Patch for this vulnerability is available at:
https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html
https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html