MEDIUM · 5.5

CVE-2016-5403

The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without wa...

Vulnerability Description

The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.

CVSS Score

5.5

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
CanonicalUbuntu Linux12.04
OracleLinux5
OracleVm Server3.4
QemuQemu<= 2.6.0
DebianDebian Linux8.0
RedhatOpenstack5.0
RedhatVirtualization3.0
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Aus7.2
RedhatEnterprise Linux Server Eus7.2
RedhatEnterprise Linux Server Tus7.2
RedhatEnterprise Linux Workstation6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-5403?

CVE-2016-5403 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without wa...

How severe is CVE-2016-5403?

CVE-2016-5403 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2016-5403?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Oracle Linux, Oracle Vm Server, Qemu Qemu, Debian Debian Linux.