CVE-2016-3710
high-risk
Published 2016-05-11
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
References (44)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0724.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0725.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0997.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0999.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1000.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1001.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1002.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1019.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1943.html
Third Party Advisory
http://support.citrix.com/article/CTX212736
Third Party Advisory
http://www.debian.org/security/2016/dsa-3573
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.h...
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.h...
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htm...
Third Party Advisory
http://www.securityfocus.com/bid/90316
Third Party Advisory
http://www.securitytracker.com/id/1035794
Third Party Advisory
http://www.ubuntu.com/usn/USN-2974-1
Third Party Advisory
http://xenbits.xen.org/xsa/advisory-179.html
Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1224
and 24 more references
52
/ 100
high-risk
Severity
27/34 · High
Exploitability
0/34 · Minimal
Exposure
25/34 · High