CVE-2015-8743

HIGH

Qemu < 2.5.1 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

References (10)

Core 10
Core References
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/01/04/2
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1264929
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1034574
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/79820
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/01/04/1
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2016/dsa-3469
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2016/dsa-3470
Patch, Vendor Advisory mailing-list x_refsource_mlist
https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00050.html
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2016/dsa-3471
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201602-01

Scores

CVSS v3 7.1
EPSS 0.0006
EPSS Percentile 19.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Details

CWE
CWE-125 CWE-787
Status published
Products (3)
debian/debian_linux 7.0
debian/debian_linux 8.0
qemu/qemu < 2.5.1
Published Dec 29, 2016
Tracked Since Feb 18, 2026