3.6
CVSSv2

CVE-2016-4454

Published: 01/06/2016 Updated: 14/05/2020
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6 | Impact Score: 5.2 | Exploitability Score: 0.8
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

canonical ubuntu linux 16.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #826152 qemu: CVE-2016-5238: scsi: esp: OOB write when using non-DMA mode in get_cmd Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 2 Jun 2016 18:54:01 UTC Severity: imp ...
USN-3047-1 introduced a regression in QEMU ...
Several security issues were fixed in QEMU ...
Quick Emulator(Qemu) built with the VMware-SVGA "chipset" emulation support is vulnerable to an information disclosure issue It could occur while processing VGA commands via its FIFO buffer A privileged user inside guest could use this flaw to leak host memory bytes or crash the Qemu process resulting in DoS ...