First published: Tue Sep 06 2011(Updated: )
Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=0.15.1 | |
QEMU | =0.15.0-rc1 | |
QEMU | =0.15.0-rc2 | |
Red Hat Enterprise Linux | =5 | |
Xen XAPI | ||
<=0.15.1 | ||
=0.15.0-rc1 | ||
=0.15.0-rc2 | ||
=5 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3346 is considered a moderate severity vulnerability due to its potential to cause denial of service.
To fix CVE-2011-3346, upgrade to QEMU version 0.15.2 or later.
CVE-2011-3346 affects local guest users with permission to access the CD-ROM in QEMU versions prior to 0.15.2.
The impact of CVE-2011-3346 is a potential guest crash resulting from a crafted SAI READ CAPACITY SCSI command.
No, CVE-2011-3346 is not remotely exploitable; it requires local access to the guest environment.