CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
49.3%
A heap buffer overflow flaw was found in QEMU’s Cirrus CLGD 54xx VGA emulator’s VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
Vendor | Product | Version | CPE |
---|---|---|---|
qemu | qemu | * | cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* |
citrix | xenserver | 6.0.2 | cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:* |
citrix | xenserver | 6.2.0 | cpe:2.3:a:citrix:xenserver:6.2.0:sp1:*:*:*:*:*:* |
citrix | xenserver | 6.5 | cpe:2.3:a:citrix:xenserver:6.5:sp1:*:*:*:*:*:* |
citrix | xenserver | 7.0 | cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:* |
citrix | xenserver | 7.1 | cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:* |
redhat | openstack | 5.0 | cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:* |
redhat | openstack | 6.0 | cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:* |
redhat | openstack | 7.0 | cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:* |
redhat | openstack | 8 | cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* |
www.securityfocus.com/bid/96893
www.securitytracker.com/id/1038023
access.redhat.com/errata/RHSA-2017:0980
access.redhat.com/errata/RHSA-2017:0981
access.redhat.com/errata/RHSA-2017:0982
access.redhat.com/errata/RHSA-2017:0983
access.redhat.com/errata/RHSA-2017:0984
access.redhat.com/errata/RHSA-2017:0985
access.redhat.com/errata/RHSA-2017:0987
access.redhat.com/errata/RHSA-2017:0988
access.redhat.com/errata/RHSA-2017:1205
access.redhat.com/errata/RHSA-2017:1206
access.redhat.com/errata/RHSA-2017:1441
bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9603
lists.debian.org/debian-lts-announce/2018/02/msg00005.html
lists.debian.org/debian-lts-announce/2018/09/msg00007.html
security.gentoo.org/glsa/201706-03
support.citrix.com/article/CTX221578
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
49.3%