6
CVSSv3

CVE-2021-3607

Published: 24/02/2022 Updated: 07/11/2023
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 6 | Impact Score: 4 | Exploitability Score: 1.5
VMScore: 436
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions before 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

debian debian linux 10.0

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #990564 qemu: CVE-2021-3607 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 2 Jul 2021 08:39:09 UTC Severity: important Tags: security, upstream Found in version qemu/1:52+d ...
No description is available for this CVE ...
An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device It could occur while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation A privileged guest user could use this flaw to make QEMU allocate a large amount of memory, resulting in a denial of service ...