QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html | mailing-list x_refsource_MLIST |
| https://security.gentoo.org/glsa/201604-01 | vendor-advisory x_refsource_GENTOO |
| http://www.debian.org/security/2016/dsa-3469 | vendor-advisory x_refsource_DEBIAN |
| http://www.debian.org/security/2016/dsa-3470 | vendor-advisory x_refsource_DEBIAN |
| http://www.openwall.com/lists/oss-security/2016/01/19/10 | mailing-list x_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=1298570 | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2016/01/22/1 | mailing-list x_refsource_MLIST |
| http://rhn.redhat.com/errata/RHSA-2016-2585.html | vendor-advisory x_refsource_REDHAT |
| http://www.debian.org/security/2016/dsa-3471 | vendor-advisory x_refsource_DEBIAN |
| http://www.securityfocus.com/bid/81549 | vdb-entry x_refsource_BID |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg03454.html | mailing-list x_refsource_MLIST x_transferred |
| https://security.gentoo.org/glsa/201604-01 | vendor-advisory x_refsource_GENTOO x_transferred |
| http://www.debian.org/security/2016/dsa-3469 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.debian.org/security/2016/dsa-3470 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.openwall.com/lists/oss-security/2016/01/19/10 | mailing-list x_refsource_MLIST x_transferred |
| https://bugzilla.redhat.com/show_bug.cgi?id=1298570 | x_refsource_CONFIRM x_transferred |
| http://www.openwall.com/lists/oss-security/2016/01/22/1 | mailing-list x_refsource_MLIST x_transferred |
| http://rhn.redhat.com/errata/RHSA-2016-2585.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://www.debian.org/security/2016/dsa-3471 | vendor-advisory x_refsource_DEBIAN x_transferred |
| http://www.securityfocus.com/bid/81549 | vdb-entry x_refsource_BID x_transferred |