Use-after-free in QEMU - CVE-2020-15859

 

Use-after-free in QEMU - CVE-2020-15859

Published: July 24, 2020


Vulnerability identifier: #VU31800
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-15859
CWE-ID: CWE-416
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
QEMU
Software vendor:
QEMU

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in hw/net/e1000e_core.c when processing MMIO operation. A local user on guest operating system can send a specially crafted e1000e packet with the data's address set to the e1000e's MMIO address and crash the QEMU process.



Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links