ID

VAR-201812-0558


CVE

CVE-2018-19665


TITLE

QEMU Integer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-013856

DESCRIPTION

The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption. QEMU Contains an integer overflow vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. QEMU is prone to an integer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Attackers can exploit this issue to crash the QEMU instance, resulting in a denial-of-service condition. Due to the nature of this issue, code execution may be possible but this has not been confirmed

Trust: 1.89

sources: NVD: CVE-2018-19665 // JVNDB: JVNDB-2018-013856 // BID: 106050

IOT TAXONOMY

category:['other device']sub_category:general

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:qemumodel:qemuscope:eqversion:3.1.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.3

Trust: 1.0

vendor:qemumodel:qemuscope:lteversion:3.0.1

Trust: 1.0

vendor:fabrice bellardmodel:qemuscope: - version: -

Trust: 0.8

vendor:qemumodel:qemuscope:eqversion:0

Trust: 0.3

sources: BID: 106050 // JVNDB: JVNDB-2018-013856 // NVD: CVE-2018-19665

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-19665
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-19665
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201812-059
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2018-19665
severity: LOW
baseScore: 2.7
vectorString: AV:A/AC:L/AU:S/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.1
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2018-19665
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2018-19665
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2018-013856 // CNNVD: CNNVD-201812-059 // NVD: CVE-2018-19665

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.8

sources: JVNDB: JVNDB-2018-013856 // NVD: CVE-2018-19665

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201812-059

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201812-059

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013856

PATCH

title:[Qemu-devel] [PATCH v2] bt: use size_t type for length parameters insteaurl:https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg03570.html

Trust: 0.8

title:QEMU Fixes for digital error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=87365

Trust: 0.6

sources: JVNDB: JVNDB-2018-013856 // CNNVD: CNNVD-201812-059

EXTERNAL IDS

db:NVDid:CVE-2018-19665

Trust: 2.8

db:OPENWALLid:OSS-SECURITY/2018/11/29/1

Trust: 2.4

db:BIDid:106050

Trust: 1.9

db:JVNDBid:JVNDB-2018-013856

Trust: 0.8

db:AUSCERTid:ESB-2019.1098.3

Trust: 0.6

db:CNNVDid:CNNVD-201812-059

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // BID: 106050 // JVNDB: JVNDB-2018-013856 // CNNVD: CNNVD-201812-059 // NVD: CVE-2018-19665

REFERENCES

url:http://www.openwall.com/lists/oss-security/2018/11/29/1

Trust: 2.4

url:http://www.securityfocus.com/bid/106050

Trust: 2.2

url:https://lists.gnu.org/archive/html/qemu-devel/2018-11/msg03570.html

Trust: 1.6

url:http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-19665

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-19665

Trust: 0.8

url:https://www.suse.com/support/update/announcement/2019/suse-su-201914001-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78254

Trust: 0.6

url:https://seclists.org/oss-sec/2018/q4/190

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-19665

Trust: 0.3

url:http://wiki.qemu.org/main_page

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1607652

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // BID: 106050 // JVNDB: JVNDB-2018-013856 // CNNVD: CNNVD-201812-059 // NVD: CVE-2018-19665

CREDITS

Arash Tohidi

Trust: 0.9

sources: BID: 106050 // CNNVD: CNNVD-201812-059

SOURCES

db:OTHERid: -
db:BIDid:106050
db:JVNDBid:JVNDB-2018-013856
db:CNNVDid:CNNVD-201812-059
db:NVDid:CVE-2018-19665

LAST UPDATE DATE

2025-01-30T20:59:50.233000+00:00


SOURCES UPDATE DATE

db:BIDid:106050date:2018-11-29T00:00:00
db:JVNDBid:JVNDB-2018-013856date:2019-03-04T00:00:00
db:CNNVDid:CNNVD-201812-059date:2020-05-13T00:00:00
db:NVDid:CVE-2018-19665date:2024-11-21T03:58:23.067

SOURCES RELEASE DATE

db:BIDid:106050date:2018-11-29T00:00:00
db:JVNDBid:JVNDB-2018-013856date:2019-03-04T00:00:00
db:CNNVDid:CNNVD-201812-059date:2018-12-04T00:00:00
db:NVDid:CVE-2018-19665date:2018-12-06T23:29:01.423