Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
High
Attack Vector
Local
0

CVE-2020-29443

Disclosure Date: January 26, 2021
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
3.9 Low
Impact Score:
2.7
Exploitability Score:
0.8
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L
Attack Vector (AV):
Local
Attack Complexity (AC):
High
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Changed
Confidentiality (C):
Low
Integrity (I):
None
Availability (A):
Low

General Information

Vendors

  • debian,
  • qemu

Products

  • debian linux 10.0,
  • debian linux 9.0,
  • qemu 5.1.0
Technical Analysis