[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-3608Date: (C)2021-07-20   (M)2024-05-24


A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.0CVSS Score : 4.9
Exploit Score: 1.5Exploit Score: 3.9
Impact Score: 4.0Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: HIGHAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: CHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: COMPLETE
Integrity: NONE 
Availability: HIGH 
  
Reference:
GLSA-202208-27
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
https://bugzilla.redhat.com/show_bug.cgi?id=1973383
https://lists.gnu.org/archive/html/qemu-devel/2021-06/msg07926.html
https://security.netapp.com/advisory/ntap-20220318-0002/

CWE    1
CWE-824
OVAL    10
oval:org.secpod.oval:def:1505071
oval:org.secpod.oval:def:89047115
oval:org.secpod.oval:def:89045115
oval:org.secpod.oval:def:89049445
...

© SecPod Technologies