A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html | Mailing List Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/04/29/5 | Exploit Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/04/29/6 | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/59541 | Third Party Advisory VDB Entry |
https://access.redhat.com/security/cve/cve-2013-2016 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016 | Exploit Issue Tracking |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83850 | Third Party Advisory VDB Entry |
https://github.com/qemu/qemu/commit/5f5a1318653c08e435cfa52f60b6a712815b659d | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2013-2016 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2019-12-30T21:47:07
Updated: 2019-12-31T14:29:44
Reserved: 2013-02-19T00:00:00
Link: CVE-2013-2016
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-30T22:15:11.387
Modified: 2020-08-18T15:05:58.080
Link: CVE-2013-2016
JSON object: View
Redhat Information
No data.
CWE