3.3
CVSSv2

CVE-2020-13361

Published: 28/05/2020 Updated: 29/11/2022
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 3.9 | Impact Score: 2.7 | Exploitability Score: 0.8
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

In QEMU 5.0.0 and previous versions, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

opensuse leap 15.2

canonical ubuntu linux 18.04

canonical ubuntu linux 20.04

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #961888 qemu: CVE-2020-13361 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 30 May 2020 21:57:02 UTC Severity: important Tags: security, upstream Found in version qemu/1 ...
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service For the stable distribution (buster), these problems have been fixed in version 1:31+dfsg-8+deb10u6 We recommend that you upgrade your qemu packages For the detailed security status of qemu please refer to its security tracker pa ...