CVE-2015-3456

Published May 13, 2015

Last updated a year ago

Overview

Description
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
7.7
Impact score
10
Exploitability score
5.1
Vector string
AV:A/AC:L/Au:S/C:C/I:C/A:C

Weaknesses

nvd@nist.gov
CWE-119

Evaluator

Comment
Though the VENOM vulnerability is also agnostic of the guest operating system, an attacker (or an attacker’s malware) would need to have administrative or root privileges in the guest operating system in order to exploit VENOM
Impact
-
Solution
-

Configurations

References