Vulnerability Description
The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.8.1.1 |
| Opensuse | Leap | 42.2 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/10/14/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/10/15/4Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/93567Third Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02577.htmlPatchThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00140.htmlMailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/10/14/6Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/10/15/4Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/93567Third Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2016-10/msg02577.htmlPatchThird Party Advisory
FAQ
What is CVE-2016-8667?
CVE-2016-8667 is a vulnerability with a CVSS score of 6.0 (MEDIUM). The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large in...
How severe is CVE-2016-8667?
CVE-2016-8667 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-8667?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Opensuse Leap, Debian Debian Linux.