Vulnerability Details : CVE-2011-2212
Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to "virtqueue in and out requests."
Vulnerability category: OverflowDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-2212
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 24 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-2212
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.4
|
HIGH | AV:A/AC:M/Au:S/C:C/I:C/A:C |
4.4
|
10.0
|
NIST |
CWE ids for CVE-2011-2212
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2212
-
https://hermes.opensuse.org/messages/9605323
openSUSE.org - 503
-
https://bugzilla.redhat.com/show_bug.cgi?id=713589
713589 – (CVE-2011-2212) CVE-2011-2212 qemu-kvm: virtqueue: too-large indirect descriptor buffer overflow
-
https://www.debian.org/security/2011/dsa-2282
Debian -- Security Information -- DSA-2282-1 qemu-kvm
-
http://ubuntu.com/usn/usn-1165-1
USN-1165-1: QEMU vulnerabilities | Ubuntu security notices
-
http://rhn.redhat.com/errata/RHSA-2011-0919.html
RHSA-2011:0919 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00007.html
[security-announce] openSUSE-SU-2011:0803-1: important: kvm
Products affected by CVE-2011-2212
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*