Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
High
Attack Vector
Local
0

CVE-2021-3748

Disclosure Date: March 23, 2022
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor’s address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
6
Exploitability Score:
0.8
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector (AV):
Local
Attack Complexity (AC):
High
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Changed
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • canonical,
  • debian,
  • fedoraproject,
  • qemu,
  • redhat

Products

  • debian linux 10.0,
  • debian linux 9.0,
  • enterprise linux 8.0,
  • enterprise linux advanced virtualization eus 8.4,
  • fedora 34,
  • qemu,
  • ubuntu linux 18.04,
  • ubuntu linux 20.04,
  • ubuntu linux 21.10
Technical Analysis