CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
41.8%
Matt Tait discovered that QEMU incorrectly handled PIT emulation. In a
non-default configuration, a malicious guest could use this issue to cause
a denial of service, or possibly execute arbitrary code on the host as the
user running the QEMU process. In the default installation, when QEMU is
used with libvirt, attackers would be isolated by the libvirt AppArmor
profile. (CVE-2015-3214)
Kevin Wolf discovered that QEMU incorrectly handled processing ATAPI
commands. A malicious guest could use this issue to cause a denial of
service, or possibly execute arbitrary code on the host as the user running
the QEMU process. In the default installation, when QEMU is used with
libvirt, attackers would be isolated by the libvirt AppArmor profile.
(CVE-2015-5154)
Zhu Donghai discovered that QEMU incorrectly handled the SCSI driver. A
malicious guest could use this issue to cause a denial of service, or
possibly execute arbitrary code on the host as the user running the QEMU
process. In the default installation, when QEMU is used with libvirt,
attackers would be isolated by the libvirt AppArmor profile. This issue
only affected Ubuntu 15.04. (CVE-2015-5158)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.04 | noarch | qemu-system | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-guest-agent | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-guest-agent-dbgsym | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-kvm | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-system-arm | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-system-arm-dbgsym | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-system-common | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-system-common-dbgsym | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
Ubuntu | 15.04 | noarch | qemu-system-mips | < 1:2.2+dfsg-5expubuntu9.3 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
41.8%