Vulnerability Description
The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.6.2 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
References
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed
- http://www.openwall.com/lists/oss-security/2016/06/07/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/06/08/14Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/91079Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3047-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3047-2Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-06/msg01507.htmlMailing ListPatchThird Party Advisory
- https://security.gentoo.org/glsa/201609-01Third Party Advisory
- http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff589551c8e8e9e95e211b9d8daafb4ed
- http://www.openwall.com/lists/oss-security/2016/06/07/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/06/08/14Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/91079Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3047-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3047-2Third Party Advisory
FAQ
What is CVE-2016-5338?
CVE-2016-5338 is a vulnerability with a CVSS score of 7.8 (HIGH). The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEM...
How severe is CVE-2016-5338?
CVE-2016-5338 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5338?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Canonical Ubuntu Linux, Debian Debian Linux.