Fabrice Bellard QEMU e1000 hw/net/e1000.c process_tx_desc infinite loop
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
3.4 | $0-$5k | 0.00 |
A vulnerability was found in Fabrice Bellard QEMU (Virtualization Software) (unknown version). It has been classified as problematic. Affected is the function process_tx_desc
of the file hw/net/e1000.c of the component e1000. The manipulation with an unknown input leads to a infinite loop vulnerability. CWE is classifying the issue as CWE-835. The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop. This is going to have an impact on availability. CVE summarizes:
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
The weakness was presented 03/18/2023. This vulnerability is traded as CVE-2015-6815 since 09/05/2015. The exploitability is told to be easy. Access to the local network is required for this attack. The requirement for exploitation is a authentication. There are known technical details, but no exploit is available.
Applying a patch is able to eliminate this problem. The advisory contains the following remark:
While processing transmit descriptors, it could lead to an infinite loop if 'bytes' was to become zero; Add a check to avoid it. [The guest can force 'bytes' to 0 by setting th
See VDB-77705 and VDB-227179 for similar entries.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 3.5VulDB Meta Temp Score: 3.4
VulDB Base Score: 3.5
VulDB Temp Score: 3.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 3.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Infinite loopCWE: CWE-835 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Timeline
09/05/2015 🔍03/18/2023 🔍
03/18/2023 🔍
04/11/2023 🔍
Sources
Vendor: bellard.orgAdvisory: USN-2745-1
Status: Confirmed
CVE: CVE-2015-6815 (🔍)
See also: 🔍
Entry
Created: 03/18/2023 09:58 AMUpdated: 04/11/2023 05:48 PM
Changes: 03/18/2023 09:58 AM (57), 04/11/2023 05:48 PM (2)
Complete: 🔍
Cache ID: 3:1B2:40
No comments yet. Languages: en.
Please log in to comment.