5.8
CVSSv2

CVE-2011-2512

Published: 21/06/2012 Updated: 13/02/2023
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
VMScore: 516
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The virtio_queue_notify in qemu-kvm 0.14.0 and previous versions does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kvm group qemu-kvm 0.12

kvm group qemu-kvm

Vendor Advisories

A privileged attacker within a QEMU guest could cause QEMU to crash ...
It was discovered that incorrect sanitising of virtio queue commands in KVM, a solution for full virtualization on x86 hardware, could lead to denial of service or the execution of arbitrary code The oldstable distribution (lenny) is not affected by this problem For the stable distribution (squeeze), this problem has been fixed in version 0125+ ...