{
  "threat_severity" : "Moderate",
  "public_date" : "2017-10-11T00:00:00Z",
  "bugzilla" : {
    "description" : "Qemu: cirrus: OOB access issue in mode4and5 write functions",
    "id" : "1501290",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1501290"
  },
  "cvss" : {
    "cvss_base_score" : "2.9",
    "cvss_scoring_vector" : "AV:A/AC:H/Au:S/C:N/I:P/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.4",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-787",
  "details" : [ "The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.", "Quick emulator (QEMU), compiled with the Cirrus CLGD 54xx VGA Emulator support, is vulnerable to an OOB write access issue. The issue could occur while writing to VGA memory via mode4and5 write functions. A privileged user inside guest could use this flaw to crash the QEMU process resulting in Denial of Serivce (DoS)." ],
  "acknowledgement" : "Red Hat would like to thank Guoxiang Niu (Huawei.com) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2018-03-13T00:00:00Z",
    "advisory" : "RHSA-2018:0516",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.503.el6_9.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-11-30T00:00:00Z",
    "advisory" : "RHSA-2017:3368",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-141.el7_4.4"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
    "release_date" : "2017-12-14T00:00:00Z",
    "advisory" : "RHSA-2017:3473",
    "cpe" : "cpe:/a:redhat:openstack:6::el7",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
    "release_date" : "2017-12-14T00:00:00Z",
    "advisory" : "RHSA-2017:3472",
    "cpe" : "cpe:/a:redhat:openstack:7::el7",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  }, {
    "product_name" : "Red Hat OpenStack Platform 10.0 (Newton)",
    "release_date" : "2017-12-14T00:00:00Z",
    "advisory" : "RHSA-2017:3474",
    "cpe" : "cpe:/a:redhat:openstack:10::el7",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  }, {
    "product_name" : "Red Hat OpenStack Platform 11.0 (Ocata)",
    "release_date" : "2017-12-14T00:00:00Z",
    "advisory" : "RHSA-2017:3466",
    "cpe" : "cpe:/a:redhat:openstack:11::el7",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  }, {
    "product_name" : "Red Hat OpenStack Platform 8.0 (Liberty)",
    "release_date" : "2017-12-14T00:00:00Z",
    "advisory" : "RHSA-2017:3471",
    "cpe" : "cpe:/a:redhat:openstack:8::el7",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  }, {
    "product_name" : "Red Hat OpenStack Platform 9.0 (Mitaka)",
    "release_date" : "2017-12-14T00:00:00Z",
    "advisory" : "RHSA-2017:3470",
    "cpe" : "cpe:/a:redhat:openstack:9::el7",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2017-11-30T00:00:00Z",
    "advisory" : "RHSA-2017:3369",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.9.0-16.el7_4.11"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat OpenStack Platform 12 (Pike)",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/a:redhat:openstack:12"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-15289\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-15289" ],
  "name" : "CVE-2017-15289",
  "csaw" : false
}