Vulnerability Description
QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.4.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
- http://www.debian.org/security/2016/dsa-3471Third Party Advisory
- http://www.openwall.com/lists/oss-security/2016/01/04/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/01/04/6Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/79821Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034576Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1270871Issue TrackingThird Party Advisory
- https://security.gentoo.org/glsa/201602-01Third Party Advisory
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a7278b36fcab9af469563bd7b
- http://www.debian.org/security/2016/dsa-3471Third Party Advisory
- http://www.openwall.com/lists/oss-security/2016/01/04/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/01/04/6Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/79821Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1034576Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1270871Issue TrackingThird Party Advisory
FAQ
What is CVE-2015-8744?
CVE-2015-8744 is a vulnerability with a CVSS score of 5.5 (MEDIUM). QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (...
How severe is CVE-2015-8744?
CVE-2015-8744 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8744?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux.