Medium severity6.7NVD Advisory· Published Sep 7, 2016· Updated May 6, 2026
CVE-2016-6351
CVE-2016-6351
Description
The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
Affected products
22cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- osv-coords17 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Manager%202.1pkg:rpm/suse/xen&distro=SUSE%20Manager%20Proxy%202.1pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%205
< 2.6.1-1.5+ 16 more
- (no CPE)range: < 2.6.1-1.5
- (no CPE)range: < 4.7.0_12-1.3
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.1.6_08-32.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_04-22.22.2
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.4.4_04-22.22.2
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.4.4_07-37.1
- (no CPE)range: < 4.5.3_08-17.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.2.5_21-27.1
- (no CPE)range: < 4.2.5_21-27.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.openwall.com/lists/oss-security/2016/07/25/14nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2016/07/26/7nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/92119nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-3047-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-3047-2nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/11/msg00038.htmlnvdMailing ListThird Party Advisory
- git.qemu.orgnvd
- git.qemu.orgnvd
News mentions
0No linked articles in our index yet.