187
VMScore

CVE-2021-3947

Published: 18/02/2022 Updated: 21/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 6.2.0

qemu qemu

Vendor Advisories

A stack-buffer-overflow was found in QEMU in the NVME component The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory A malicious user could use this flaw leading to disclosure of sensitive information ...
A stack-buffer-overflow was found in QEMU in the NVME component The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory A malicious user could use this flaw leading to disclosure of sensitive information ...

Github Repositories

Recursive MMIO VM Escape PoC

CVE-2021-3929-3947 VM escape PoC for CVE-2021-3929 and CVE-2021-3947 Educational purposes only You can read the white paper for more information Environment OS: Ubuntu 2110 Linux: 5130 gcc: 1120 glibc: 234 glib: 2684 QEMU: 610 Guest OS: Ubuntu 2104 Commands Host qemu-system-x86_64 run -machine type=q35,accel=kvm -cpu host \