CVE-2019-3812

MEDIUM

Qemu < 3.1.0 - Memory Corruption

Title source: rule
STIX 2.1

Description

QEMU, through version 2.10 and through version 3.1.0, is vulnerable to an out-of-bounds read of up to 128 bytes in the hw/i2c/i2c-ddc.c:i2c_ddc() function. A local attacker with permission to execute i2c commands could exploit this to read stack memory of the qemu process on the host.

References (9)

Core 9
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3812
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/107059
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3923-1/
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00094.html
Third Party Advisory vendor-advisory x_refsource_debian
https://www.debian.org/security/2019/dsa-4454
Mailing List mailing-list x_refsource_bugtraq
https://seclists.org/bugtraq/2019/May/76

Scores

CVSS v3 4.4
EPSS 0.0007
EPSS Percentile 22.1%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Details

CWE
CWE-119 CWE-125
Status published
Products (6)
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
fedoraproject/fedora 29
fedoraproject/fedora 30
opensuse/leap 42.3
qemu/qemu 2.10.0 - 3.1.0
Published Feb 19, 2019
Tracked Since Feb 18, 2026