{
  "threat_severity" : "Important",
  "public_date" : "2017-02-21T00:00:00Z",
  "bugzilla" : {
    "description" : "Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo",
    "id" : "1420484",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1420484"
  },
  "cvss" : {
    "cvss_base_score" : "4.9",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:S/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-787",
  "details" : [ "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.", "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2017-03-07T00:00:00Z",
    "advisory" : "RHSA-2017:0454",
    "cpe" : "cpe:/a:redhat:rhel_virtualization:5",
    "package" : "kvm-0:83-277.el5_11"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2017-03-01T00:00:00Z",
    "advisory" : "RHSA-2017:0352",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.491.el6_8.7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2017-03-02T00:00:00Z",
    "advisory" : "RHSA-2017:0396",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-126.el7_3.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0334",
    "cpe" : "cpe:/a:redhat:openstack:5::el6",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.7"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0333",
    "cpe" : "cpe:/a:redhat:openstack:5::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0332",
    "cpe" : "cpe:/a:redhat:openstack:6::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0331",
    "cpe" : "cpe:/a:redhat:openstack:7::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 10.0 (Newton)",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0328",
    "cpe" : "cpe:/a:redhat:openstack:10::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 8.0 (Liberty)",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0330",
    "cpe" : "cpe:/a:redhat:openstack:8::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 9.0 (Mitaka)",
    "release_date" : "2017-02-27T00:00:00Z",
    "advisory" : "RHSA-2017:0329",
    "cpe" : "cpe:/a:redhat:openstack:9::el7",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2017-03-01T00:00:00Z",
    "advisory" : "RHSA-2017:0350",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-6",
    "release_date" : "2017-03-01T00:00:00Z",
    "advisory" : "RHSA-2017:0351",
    "cpe" : "cpe:/a:redhat:enterprise_linux:6::hypervisor",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.491.el6_8.7"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-7",
    "release_date" : "2017-03-01T00:00:00Z",
    "advisory" : "RHSA-2017:0350",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "qemu-kvm-rhev-10:2.6.0-28.el7_3.6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Affected",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "xen",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 11 (Ocata)",
    "fix_state" : "Not affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/a:redhat:openstack:11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-2620\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-2620\nhttps://xenbits.xen.org/xsa/advisory-209.html" ],
  "name" : "CVE-2017-2620",
  "csaw" : false
}