{
  "threat_severity" : "Important",
  "public_date" : "2017-03-14T00:00:00Z",
  "bugzilla" : {
    "description" : "Qemu: cirrus: heap buffer overflow via vnc connection",
    "id" : "1430056",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1430056"
  },
  "cvss" : {
    "cvss_base_score" : "4.9",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-122",
  "details" : [ "A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.", "A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2017-05-09T00:00:00Z",
    "advisory" : "RHSA-2017:1206",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.503.el6_9.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0987",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-126.el7_3.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
    "release_date" : "2017-06-14T00:00:00Z",
    "advisory" : "RHSA-2017:1441",
    "cpe" : "cpe:/a:redhat:openstack:5::el6",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.503.el6_9.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0980",
    "cpe" : "cpe:/a:redhat:openstack:5::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0981",
    "cpe" : "cpe:/a:redhat:openstack:6::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0982",
    "cpe" : "cpe:/a:redhat:openstack:7::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "Red Hat OpenStack Platform 10.0 (Newton)",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0988",
    "cpe" : "cpe:/a:redhat:openstack:10::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "Red Hat OpenStack Platform 8.0 (Liberty)",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0983",
    "cpe" : "cpe:/a:redhat:openstack:8::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "Red Hat OpenStack Platform 9.0 (Mitaka)",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0984",
    "cpe" : "cpe:/a:redhat:openstack:9::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0985",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-6",
    "release_date" : "2017-05-09T00:00:00Z",
    "advisory" : "RHSA-2017:1205",
    "cpe" : "cpe:/a:redhat:enterprise_linux:6::hypervisor",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.503.el6_9.3"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-7",
    "release_date" : "2017-04-18T00:00:00Z",
    "advisory" : "RHSA-2017:0985",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.9"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 11 (Ocata)",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/a:redhat:openstack:11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-9603\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-9603" ],
  "name" : "CVE-2016-9603",
  "csaw" : false
}