Vulnerability Description
The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.6.0 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/05/19/4Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/90762Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3047-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3047-2Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1337505Issue TrackingThird Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.htmlMailing ListPatchThird Party Advisory
- https://security.gentoo.org/glsa/201609-01Third Party Advisory
- http://www.openwall.com/lists/oss-security/2016/05/19/4Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/90762Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3047-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3047-2Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1337505Issue TrackingThird Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03274.htmlMailing ListPatchThird Party Advisory
FAQ
What is CVE-2016-4441?
CVE-2016-4441 is a vulnerability with a CVSS score of 6.0 (MEDIUM). The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of servic...
How severe is CVE-2016-4441?
CVE-2016-4441 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-4441?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Canonical Ubuntu Linux, Debian Debian Linux.