Medium severity6.7NVD Advisory· Published May 20, 2016· Updated May 6, 2026
CVE-2016-4439
CVE-2016-4439
Description
The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
Affected products
33cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- osv-coords28 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/qemu-linux-user&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kvm&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/qemu&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Manager%202.1pkg:rpm/suse/xen&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%205
< 2.6.1-1.5+ 27 more
- (no CPE)range: < 2.6.1-1.5
- (no CPE)range: < 2.6.1-1.5
- (no CPE)range: < 4.7.0_12-1.3
- (no CPE)range: < 1.4.2-46.1
- (no CPE)range: < 1.4.2-46.1
- (no CPE)range: < 1.4.2-44.1
- (no CPE)range: < 1.4.2-44.1
- (no CPE)range: < 2.0.2-48.19.1
- (no CPE)range: < 2.3.1-14.1
- (no CPE)range: < 2.0.2-48.19.1
- (no CPE)range: < 2.3.1-14.1
- (no CPE)range: < 2.0.2-48.19.1
- (no CPE)range: < 2.3.1-14.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.1.6_08-29.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_04-22.22.2
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.4.4_04-22.22.2
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.2.5_21-27.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.openwall.com/lists/oss-security/2016/05/19/3nvdMailing ListPatchThird Party Advisory
- lists.gnu.org/archive/html/qemu-devel/2016-05/msg03273.htmlnvdMailing ListPatchThird Party Advisory
- www.securityfocus.com/bid/90760nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-3047-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3047-2nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party AdvisoryVDB Entry
- lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlnvdMailing ListThird Party Advisory
- security.gentoo.org/glsa/201609-01nvdThird Party Advisory
News mentions
0No linked articles in our index yet.