4.4
CVSSv3

CVE-2016-7423

Published: 10/10/2016 Updated: 12/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 4.4 | Impact Score: 3.6 | Exploitability Score: 0.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

Vendor Advisories

Several security issues were fixed in QEMU ...
Debian Bug report logs - #838850 qemu: CVE-2016-7161 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 25 Sep 2016 18:27:02 UTC Severity: important Tags: patch, security, upstream Found in versions ...
Debian Bug report logs - #838146 qemu: CVE-2016-7422: virtio: null pointer dereference in virtqueue_map_desc Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 17 Sep 2016 17:57:13 UTC Severity: impo ...
Debian Bug report logs - #838147 qemu: CVE-2016-7421: scsi: pvscsi: infinite loop when processing IO requests Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 17 Sep 2016 18:00:01 UTC Severity: nor ...
Debian Bug report logs - #838145 qemu: CVE-2016-7423: scsi: mptsas: OOB access when freeing MPTSASRequest object Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 17 Sep 2016 17:57:09 UTC Severity: ...
A flaw was found in the Quick Emulator(QEMU) built with LSI SAS1068 Host Bus emulation support, where it is vulnerable to an invalid memory-access issue The flaw could occur while processing SCSI IO requests in the mptsas_process_scsi_io_request routine A privileged user inside the guest could use this flaw to crash the QEMU-process instance on t ...