First published: Mon May 23 2016(Updated: )
Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.5.1.1 | |
QEMU KVM | =2.6.0-rc0 | |
QEMU KVM | =2.6.0-rc1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Fedora | =22 | |
Fedora | =23 | |
Fedora | =24 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4001 is considered a high severity vulnerability due to its potential to cause a denial of service by crashing QEMU.
To fix CVE-2016-4001, you should update QEMU to a version later than 2.5.1.1 or to a stable release following 2.6.0-rc1.
CVE-2016-4001 affects QEMU versions up to and including 2.5.1.1 and specific release candidates like 2.6.0-rc0 and 2.6.0-rc1.
The buffer overflow in CVE-2016-4001 is triggered when the Stellaris ethernet controller in QEMU is configured to accept large packets.
Yes, CVE-2016-4001 can be exploited remotely, allowing attackers to crash QEMU by sending a large packet.