First published: Mon Aug 22 2016(Updated: )
Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support is vulnerable to an OOB access issue. In that it does not check if packet headers does not check for IP header length. It could lead to a OOB access when reading further packet data. A privileged user inside guest could use this issue to crash the Qemu process instance or potentially execute arbitrary code on the host, with privileges of the Qemu process. Upstream patch: --------------- -> <a href="https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html">https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2016/08/18/4">http://www.openwall.com/lists/oss-security/2016/08/18/4</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <2.6.0 | |
Red Hat Enterprise Virtualization | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6835 is considered a medium-severity vulnerability due to its potential for out-of-bounds (OOB) access.
To fix CVE-2016-6835, upgrade QEMU to a version higher than 2.6.0 that addresses this vulnerability.
CVE-2016-6835 affects QEMU versions prior to 2.6.0.
CVE-2016-6835 impacts systems running QEMU with VMWARE VMXNET3 NIC device support.
CVE-2016-6835 can be exploited by a privileged user inside a guest operating system.