Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3748
HistoryAug 31, 2021 - 12:00 a.m.

CVE-2021-3748

2021-08-3100:00:00
ubuntu.com
ubuntu.com
26
use-after-free
virtio-net
qemu
denial of service
malicious guest
code execution
bugzilla.redhat.com
num_buffers
non direct access
host privileges

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

14.2%

A use-after-free vulnerability was found in the virtio-net device of QEMU.
It could occur when the descriptor’s address belongs to the non direct
access region, due to num_buffers being set after the virtqueue elem has
been unmapped. A malicious guest could use this flaw to crash QEMU,
resulting in a denial of service condition, or potentially execute code on
the host with the privileges of the QEMU process.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchqemu< 1:2.11+dfsg-1ubuntu7.39UNKNOWN
ubuntu20.04noarchqemu< 1:4.2-3ubuntu6.21UNKNOWN
ubuntu21.10noarchqemu< 1:6.0+dfsg-2expubuntu1.2UNKNOWN
ubuntu22.04noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN
ubuntu22.10noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

14.2%