CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
94.2%
hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
Vendor | Product | Version | CPE |
---|---|---|---|
qemu | qemu | * | cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* |
fedoraproject | fedora | 21 | cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:* |
fedoraproject | fedora | 22 | cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:* |
debian | debian_linux | 7.0 | cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html
lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html
lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html
www.debian.org/security/2016/dsa-3469
www.debian.org/security/2016/dsa-3470
www.debian.org/security/2016/dsa-3471
www.openwall.com/lists/oss-security/2015/09/18/5
www.openwall.com/lists/oss-security/2015/09/18/9
www.securityfocus.com/bid/82672
security.gentoo.org/glsa/201602-01