hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
21 Nov 2024, 02:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3361 - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3362 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/09/10/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/09/10/2 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/76691 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2745-1 - Third Party Advisory | |
References | () https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201602-01 - Third Party Advisory | |
References | () https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14 - Third Party Advisory |
15 Dec 2021, 17:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14 - Third Party Advisory | |
CPE | cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:* |
17 Nov 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Nov 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Nov 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2015-11-06 21:59
Updated : 2024-11-21 02:35
NVD link : CVE-2015-6855
Mitre link : CVE-2015-6855
CVE.ORG link : CVE-2015-6855
JSON object : View
Products Affected
debian
- debian_linux
arista
- eos
canonical
- ubuntu_linux
suse
- linux_enterprise_server
- linux_enterprise_desktop
qemu
- qemu
fedoraproject
- fedora
CWE
CWE-369
Divide By Zero