6.9
CVSSv2

CVE-2013-2016

Published: 30/12/2019 Updated: 18/08/2020
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

qemu qemu 1.5.0

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

novell open desktop server 11.0

novell open enterprise server 11.0

Vendor Advisories

Debian Bug report logs - #710822 qemu: cve-2013-2016 Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Michael Gilbert <mgilbert@debianorg> Date: Sun, 2 Jun 2013 18:57:02 UTC Severity: minor Tags: security ...