Products
QEMU
Source
secalert@redhat.com
Tags
CVE-2024-6505 details
Published : July 5, 2024, 2:15 p.m.
Last Modified : July 5, 2024, 5:10 p.m.
Last Modified : July 5, 2024, 5:10 p.m.
Description
A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.0 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-125 | Out-of-bounds Read | The product reads data past the end, or before the beginning, of the intended buffer. |
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
Base Score
6.0
Exploitability Score
1.5
Impact Score
4.0
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
References
URL | Source |
---|---|
https://access.redhat.com/security/cve/CVE-2024-6505 | secalert@redhat.com |
https://bugzilla.redhat.com/show_bug.cgi?id=2295760 | secalert@redhat.com |
This website uses the NVD API, but is not approved or certified by it.