Vulnerability Description
The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 12.04 |
| Qemu | Qemu | <= 2.6.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/05/19/3Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/90760Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3047-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3047-2Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1337502Issue TrackingThird Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.htmlMailing ListPatchThird Party Advisory
- https://security.gentoo.org/glsa/201609-01Third Party Advisory
- http://www.openwall.com/lists/oss-security/2016/05/19/3Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/90760Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3047-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3047-2Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1337502Issue TrackingThird Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.htmlMailing ListPatchThird Party Advisory
FAQ
What is CVE-2016-4439?
CVE-2016-4439 is a vulnerability with a CVSS score of 6.7 (MEDIUM). The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a...
How severe is CVE-2016-4439?
CVE-2016-4439 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4439?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Qemu Qemu, Debian Debian Linux.