6.7
CVSSv3

CVE-2020-13754

Published: 02/06/2020 Updated: 14/12/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

hw/pci/msix.c in QEMU 4.2.0 allows guest OS users to trigger an out-of-bounds access via a crafted address in an msi-x mmio operation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

canonical ubuntu linux 20.04

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

It was discovered that incorrect memory handling in the SLIRP networking implementation could result in denial of service or potentially the execution of arbitrary code For the stable distribution (buster), this problem has been fixed in version 1:31+dfsg-8+deb10u7 In addition this update fixes a regression caused by the patch for CVE-2020-13754 ...
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service For the stable distribution (buster), these problems have been fixed in version 1:31+dfsg-8+deb10u6 We recommend that you upgrade your qemu packages For the detailed security status of qemu please refer to its security tracker pa ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2020-13754 QEMU: msix: OOB access during mmio operations may lead to DoS <!--X-Subject-Header-End--> <!--X-Head-of-Mes ...