2.1
CVSSv2

CVE-2020-25723

Published: 02/12/2020 Updated: 30/09/2022
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.2 | Impact Score: 1.4 | Exploitability Score: 1.5
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #975276 qemu: CVE-2020-25723 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 19 Nov 2020 21:33:02 UTC Severity: important Tags: security, upstream Found in version qemu/1 ...
A heap buffer overflow flaw was found in the iSCSI support of QEMU This flaw could lead to an out-of-bounds read access and possible information disclosure from the QEMU process memory to a malicious guest The highest threat from this vulnerability is to data confidentiality (CVE-2020-11947) An infinite loop flaw was found in the e1000e NIC emul ...
A reachable assertion issue was found in the USB EHCI emulation code of QEMU It could occur while processing USB requests due to missing handling of DMA memory map failure A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service ...