hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2015/09/18/9 | mailing-list x_refsource_MLIST |
| http://www.securityfocus.com/bid/82672 | vdb-entry x_refsource_BID |
| http://www.openwall.com/lists/oss-security/2015/09/18/5 | mailing-list x_refsource_MLIST |
| http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html | vendor-advisory x_refsource_FEDORA |
| http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html | vendor-advisory x_refsource_FEDORA |
| http://www.debian.org/security/2016/dsa-3469 | vendor-advisory x_refsource_DEBIAN |
| http://www.debian.org/security/2016/dsa-3470 | vendor-advisory x_refsource_DEBIAN |
| http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html | vendor-advisory x_refsource_FEDORA |
| http://www.debian.org/security/2016/dsa-3471 | vendor-advisory x_refsource_DEBIAN |
| https://security.gentoo.org/glsa/201602-01 | vendor-advisory x_refsource_GENTOO |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|