Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2016-2841
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-16 Jun, 2016 | 18:59
Updated At-12 Apr, 2025 | 10:46

The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.0MEDIUM
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

QEMU
qemu
>>qemu>>Versions up to 2.5.0(inclusive)
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>12.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>15.10
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=415ab35a441eca767d033a2702223e785b9d5190secalert@redhat.com
N/A
http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.htmlsecalert@redhat.com
Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/03/02/8secalert@redhat.com
N/A
http://www.securityfocus.com/bid/84028secalert@redhat.com
N/A
http://www.ubuntu.com/usn/USN-2974-1secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1303106secalert@redhat.com
N/A
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlsecalert@redhat.com
N/A
https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg06126.htmlsecalert@redhat.com
Vendor Advisory
https://security.gentoo.org/glsa/201609-01secalert@redhat.com
N/A
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=415ab35a441eca767d033a2702223e785b9d5190af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.openwall.com/lists/oss-security/2016/03/02/8af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/84028af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2974-1af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1303106af854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg06126.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security.gentoo.org/glsa/201609-01af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found