CVE-2013-2016

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
qemuqemu
1.3.0 ≤
𝑥
≤ 1.4.2
qemuqemu
1.5.0:rc1
debiandebian_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
novellopen_desktop_server
11.0:sp3
novellopen_enterprise_server
11.0:sp3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
jessie
not-affected
wheezy
not-affected
squeeze
not-affected
bullseye (security)
1:5.2+dfsg-11+deb11u2
fixed
bookworm
1:7.2+dfsg-7+deb12u7
fixed
sid
1:9.1.1+ds-2
fixed
trixie
1:9.1.1+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
kvm
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
ignored
qemu
saucy
not-affected
raring
ignored
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
ignored
qemu-kvm
saucy
dne
raring
dne
quantal
not-affected
precise
not-affected
oneiric
not-affected
lucid
not-affected
hardy
dne
xen-3.1
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
ignored
xen-3.2
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
dne
hardy
ignored
xen-3.3
saucy
dne
raring
dne
quantal
dne
precise
dne
oneiric
dne
lucid
not-affected
hardy
dne