← Volver a CVEs
CVE-2021-3713
HIGH7.4
Descripcion
An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.
Detalles CVE
Puntuacion CVSS v3.17.4
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vector de ataquePHYSICAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado8/25/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
debian:debian_linuxqemu:qemu
Debilidades (CWE)
CWE-787CWE-787
Referencias
https://bugzilla.redhat.com/show_bug.cgi?id=1994640(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html(secalert@redhat.com)
https://security.gentoo.org/glsa/202208-27(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20210923-0006/(secalert@redhat.com)
https://www.debian.org/security/2021/dsa-4980(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1994640(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202208-27(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210923-0006/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4980(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.