CVE Vulnerabilities

CVE-2013-2016

Improper Privilege Management

Published: Dec 30, 2019 | Modified: Aug 18, 2020
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
6.5 IMPORTANT
AV:A/AC:H/Au:S/C:C/I:C/A:C
RedHat/V3
Ubuntu
LOW

A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching hosts qemu address space and thus increase their privileges on the host.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

Name Vendor Start Version End Version
Qemu Qemu 1.3.0 (including) 1.4.2 (including)
Qemu Qemu 1.5.0-rc1 (including) 1.5.0-rc1 (including)
Kvm Ubuntu hardy *
Kvm Ubuntu upstream *
Qemu Ubuntu hardy *
Qemu Ubuntu raring *
Qemu Ubuntu upstream *
Qemu-kvm Ubuntu upstream *
Xen-3.1 Ubuntu hardy *
Xen-3.2 Ubuntu hardy *

Potential Mitigations

References