Description
Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
References (8)
Core 8
Core References
Mailing List, Third Party Advisory x_refsource_misc
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
Mailing List, Third Party Advisory x_refsource_misc
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
Mailing List, Third Party Advisory x_refsource_misc
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2015-07/msg05458.html
Mailing List, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2015/08/06/3
Exploit, Mailing List, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2015/08/06/5
Patch, Third Party Advisory x_refsource_misc
https://github.com/qemu/qemu/commit/7882080388be5088e72c425b02223c02e6cb4295
Third Party Advisory x_refsource_misc
https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
Scores
CVSS v3
6.5
EPSS
0.0140
EPSS Percentile
80.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (8)
arista/eos
4.12
arista/eos
4.13
arista/eos
4.14
arista/eos
4.15
fedoraproject/fedora
21
fedoraproject/fedora
22
fedoraproject/fedora
23
qemu/qemu
< 2.4.0
Published
Jan 23, 2020
Tracked Since
Feb 18, 2026