First published: Wed Sep 07 2016(Updated: )
The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.6.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6351 has a high severity rating due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2016-6351, you should upgrade to a version of QEMU that is newer than 2.6.2, where this vulnerability has been addressed.
CVE-2016-6351 affects local guest OS administrators using QEMU versions up to 2.6.2 with ESP/NCR53C9x controller emulation.
CVE-2016-6351 can facilitate a denial of service attack or allow execution of arbitrary code on the QEMU host system.
Vulnerable operating systems include Ubuntu Linux versions 12.04, 14.04, and 16.04, as well as Debian Linux version 8.0, running QEMU 2.6.2 or earlier.