Vulnerability Description
The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.5.1.1 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
| Redhat | Openstack | 5.0 |
| Redhat | Virtualization | 3.0 |
| Redhat | Enterprise Linux | 7.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 7.3 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.3 |
| Redhat | Enterprise Linux Server Tus | 7.3 |
| Redhat | Enterprise Linux Workstation | 6.0 |
Related Weaknesses (CWE)
References
- http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=362786f14a753d8a5256ef97d7c10
- http://rhn.redhat.com/errata/RHSA-2016-2670.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2671.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2704.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2705.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2706.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0083.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0309.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0334.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0344.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2017-0350.htmlThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/03/03/9Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/03/07/3Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/84130Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2974-1Third Party Advisory
FAQ
What is CVE-2016-2857?
CVE-2016-2857 is a vulnerability with a CVSS score of 8.4 (HIGH). The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
How severe is CVE-2016-2857?
CVE-2016-2857 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2857?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Openstack, Redhat Virtualization.