CVE编号
CVE-2016-4001利用情况
暂无补丁情况
官方补丁披露时间
2016-05-24漏洞描述
QEMU是一套模拟处理器软件。当虚拟机NIC被配置为接收MTU数据包时,QEMU的stellaris_enet模拟器中的‘stellaris_enet_receive’函数存在缓冲区溢出漏洞,远程攻击者可利用该漏洞进行拒绝服务攻击。
解决建议
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:http://wiki.qemu.org/
参考链接 |
|
---|---|
http://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66 | |
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html | |
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html | |
http://www.openwall.com/lists/oss-security/2016/04/11/4 | |
http://www.openwall.com/lists/oss-security/2016/04/12/6 | |
http://www.securityfocus.com/bid/85976 | |
http://www.ubuntu.com/usn/USN-2974-1 | |
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html | |
https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01334.html | |
https://security.gentoo.org/glsa/201609-01 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | qemu | qemu | * |
Up to (including) 2.5.1.1 |
|||||
运行在以下环境 | |||||||||
应用 | qemu | qemu | 2.6.0 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 15.10 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 16.04 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 1:2.6+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | kvm | * |
Up to (excluding) 1:2.1+dfsg-12+deb8u7 |
|||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 22 | - | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 23 | - | |||||
运行在以下环境 | |||||||||
系统 | fedoraproject | fedora | 24 | - | |||||
运行在以下环境 | |||||||||
系统 | fedora_22 | kvm | * |
Up to (excluding) 4.5.3-2.fc22 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_23 | kvm | * |
Up to (excluding) 4.5.3-2.fc23 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_24 | kvm | * |
Up to (excluding) 4.6.1-6.fc24 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_13.2 | kvm | * |
Up to (excluding) 4.4.4_05-49.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.1 | kvm | * |
Up to (excluding) 4.5.3_10-15.2 |
|||||
运行在以下环境 | |||||||||
系统 | sles_11_SP4 | kvm | * |
Up to (excluding) 1.4.2-44.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | kvm | * |
Up to (excluding) 1.7.4-48.19.1 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | qemu | * |
Up to (excluding) 2.0.2-48.19 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12_SP1 | kvm | * |
Up to (excluding) 4.5.3_08-17.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | kvm | * |
Up to (excluding) 1.4.2-44.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12 | kvm | * |
Up to (excluding) 2.0.2-48.19.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP1 | kvm | * |
Up to (excluding) 4.5.3_08-17.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04_lts | qemu-kvm | * |
Up to (excluding) 1.0+noroms-0ubuntu14.28 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04 | kvm | * |
Up to (excluding) 2.0.0+dfsg-2ubuntu1.24 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | qemu | * |
Up to (excluding) 2.0.0+dfsg-2ubuntu1.24 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | kvm | * |
Up to (excluding) 1:2.5+dfsg-5ubuntu10.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | qemu | * |
Up to (excluding) 1:2.5+dfsg-5ubuntu10.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...