CVE-2020-14364
moderate-risk
Published 2020-08-31
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Do I need to act?
!
13.9% chance of exploitation in next 30 days
EPSS score — higher than 86% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.0/10
Medium
LOCAL
/ HIGH complexity
Affected Products (15)
References (24)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1869201
Third Party Advisory
https://security.gentoo.org/glsa/202009-14
Third Party Advisory
https://security.gentoo.org/glsa/202011-09
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200924-0006/
Third Party Advisory
https://usn.ubuntu.com/4511-1/
Third Party Advisory
https://www.debian.org/security/2020/dsa-4760
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1869201
Third Party Advisory
https://security.gentoo.org/glsa/202009-14
Third Party Advisory
https://security.gentoo.org/glsa/202011-09
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200924-0006/
and 4 more references
43
/ 100
moderate-risk
Severity
13/34 · Low
Exploitability
12/34 · Low
Exposure
18/34 · Moderate