Bug 1369012 (CVE-2016-6835) - CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation
Summary: CVE-2016-6835 Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_heade...
Keywords:
Status: NEW
Alias: CVE-2016-6835
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20160809,repor...
Depends On: 1378404 1369015 1369018 1369019 1370368 1370369 1370370 1370371 1370372 1370373 1378403
Blocks: 1347787
TreeView+ depends on / blocked
 
Reported: 2016-08-22 10:37 UTC by Prasad J Pandit
Modified: 2019-06-08 21:24 UTC (History)
35 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:2392 normal SHIPPED_LIVE Important: qemu-kvm-rhev security, bug fix, and enhancement update 2017-08-01 20:04:36 UTC

Description Prasad J Pandit 2016-08-22 10:37:52 UTC
Quick Emulator(Qemu) built with the VMWARE VMXNET3 NIC device support is
vulnerable to an OOB access issue. In that it does not check if packet headers
does not check for IP header length. It could lead to a OOB access when
reading further packet data.

A privileged user inside guest could use this issue to crash the Qemu process
instance or potentially execute arbitrary code on the host, with privileges of
the Qemu process.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html


Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2016/08/18/4

Comment 1 Prasad J Pandit 2016-08-22 10:38:32 UTC
Acknowledgments:

Name: Li Qiang (Qihoo 360 Inc.)

Comment 2 Prasad J Pandit 2016-08-22 10:39:41 UTC
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1369015]

Comment 12 errata-xmlrpc 2017-08-02 04:44:51 UTC
This issue has been addressed in the following products:

  RHEV 4.X RHEV-H and Agents for RHEL-7

Via RHSA-2017:2392 https://access.redhat.com/errata/RHSA-2017:2392


Note You need to log in before you can comment on or make changes to this bug.