Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3607
HistoryJun 18, 2021 - 12:00 a.m.

CVE-2021-3607

2021-06-1800:00:00
ubuntu.com
ubuntu.com
13
integer overflow
vmware
paravirtual rdma
qemu
improper input validation
denial of service
system availability

CVSS2

4.9

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

EPSS

0

Percentile

14.2%

An integer overflow was found in the QEMU implementation of VMWare’s
paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while
handling a “PVRDMA_REG_DSRHIGH” write from the guest due to improper input
validation. This flaw allows a privileged guest user to make QEMU allocate
a large amount of memory, resulting in a denial of service. The highest
threat from this vulnerability is to system availability.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchqemu< 1:4.2-3ubuntu6.17UNKNOWN
ubuntu20.10noarchqemu< 1:5.0-5ubuntu9.9UNKNOWN
ubuntu21.04noarchqemu< 1:5.2+dfsg-9ubuntu3.1UNKNOWN
ubuntu21.10noarchqemu< 1:6.0+dfsg-2expubuntu1UNKNOWN
ubuntu22.04noarchqemu< 1:6.0+dfsg-2expubuntu1UNKNOWN

CVSS2

4.9

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

EPSS

0

Percentile

14.2%