3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.7%
QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing ‘ioport’ r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
www.debian.org/security/2016/dsa-3469
www.debian.org/security/2016/dsa-3470
www.debian.org/security/2016/dsa-3471
www.openwall.com/lists/oss-security/2016/01/04/1
www.openwall.com/lists/oss-security/2016/01/04/2
www.securityfocus.com/bid/79820
www.securitytracker.com/id/1034574
bugzilla.redhat.com/show_bug.cgi?id=1264929
lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.html
security.gentoo.org/glsa/201602-01
3.6 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:P/A:N
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
7.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
26.7%