First published: Thu May 19 2016(Updated: )
Quick Emulator(Qemu) built with the ESP/NCR53C9x controller emulation support is vulnerable to an OOB write access issue. The controller uses 16-byte FIFO buffer for command and data transfer. The OOB write occurs while writing to this command buffer in esp_reg_write(). A privileged user inside guest could use this flaw to crash the Qemu process resulting in DoS OR potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html">https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/05/19/3">http://www.openwall.com/lists/oss-security/2016/05/19/3</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
QEMU KVM | <=2.6.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4439 has been classified as a high severity vulnerability due to the potential for out-of-bounds write access.
To mitigate CVE-2016-4439, update QEMU to version 2.6.1 or later, and ensure that affected operating system packages are updated.
CVE-2016-4439 affects QEMU versions up to 2.6.0 as well as specific versions of Ubuntu Linux 12.04, 14.04, 16.04, and Debian Linux 8.0.
Privileged users operating within virtual machines utilizing the QEMU emulator may be impacted by CVE-2016-4439.
CVE-2016-4439 is an out-of-bounds write access vulnerability related to emulation support for the ESP/NCR53C9x controller.