7.5
CVSSv3

CVE-2019-15890

Published: 06/09/2019 Updated: 20/09/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

It exists that the LSI SCSI adapter emulator implementation in QEMU did not properly validate executed scripts. A local attacker could use this to cause a denial of service. (CVE-2019-12068)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libslirp project libslirp 4.0.0

qemu qemu 4.1.0

Vendor Advisories

Debian Bug report logs - #939868 slirp4netns: CVE-2019-15890 Package: src:slirp4netns; Maintainer for src:slirp4netns is Reinhard Tartler <siretart@tauwarede>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 9 Sep 2019 15:45:01 UTC Severity: grave Tags: security, upstream Found in version slirp4ne ...
Several security issues were fixed in QEMU ...
Several security issues were fixed in QEMU ...
Two security issues have been found in the SLiRP networking implementation of QEMU, a fast processor emulator, which could result in the execution of arbitrary code or denial of service For the oldstable distribution (stretch), these problems have been fixed in version 1:28+dfsg-6+deb9u9 For the stable distribution (buster), these problems have ...
Synopsis Important: slirp4netns security update Type/Severity Security Advisory: Important Topic An update for slirp4netns is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CV ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base scor ...
Synopsis Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the virt:rhel and virt-devel:rhel modules is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a securi ...
A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator The issue occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service (CVE-2 ...
A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator The issue occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service (CVE-2 ...