LOW · 2.5

CVE-2020-13659

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.

Vulnerability Description

address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.

CVSS Score

2.5

LOW

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality
NONE
Integrity
NONE
Availability
LOW

Affected Products

VendorProductVersions
QemuQemu4.2.0
DebianDebian Linux9.0
OpensuseLeap15.2
CanonicalUbuntu Linux16.04

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-13659?

CVE-2020-13659 is a vulnerability with a CVSS score of 2.5 (LOW). address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.

How severe is CVE-2020-13659?

CVE-2020-13659 has been rated LOW with a CVSS base score of 2.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-13659?

Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux, Opensuse Leap, Canonical Ubuntu Linux.