CVE-2011-1751
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
21/06/2012
Last modified:
11/04/2025
Description
The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."
Impact
Base Score 2.0
7.40
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.nelhage.com/2011/08/breaking-out-of-kvm/
- http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba%3Dcommit%3Bh%3D505597e4476a6bc219d0ec1362b760d71cb4fdca
- http://lists.nongnu.org/archive/html/qemu-devel/2011-05/msg01810.html
- http://lists.opensuse.org/opensuse-updates/2011-05/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2011-0534.html
- http://secunia.com/advisories/44393
- http://secunia.com/advisories/44458
- http://secunia.com/advisories/44648
- http://secunia.com/advisories/44658
- http://secunia.com/advisories/44660
- http://secunia.com/advisories/44900
- http://www.openwall.com/lists/oss-security/2011/05/19/2
- http://www.osvdb.org/73395
- http://www.securityfocus.com/bid/47927
- https://bugzilla.redhat.com/show_bug.cgi?id=699773
- https://github.com/nelhage/virtunoid
- https://hermes.opensuse.org/messages/8572547
- https://www.ubuntu.com/usn/USN-1145-1/
- http://blog.nelhage.com/2011/08/breaking-out-of-kvm/
- http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba%3Dcommit%3Bh%3D505597e4476a6bc219d0ec1362b760d71cb4fdca
- http://lists.nongnu.org/archive/html/qemu-devel/2011-05/msg01810.html
- http://lists.opensuse.org/opensuse-updates/2011-05/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2011-0534.html
- http://secunia.com/advisories/44393
- http://secunia.com/advisories/44458
- http://secunia.com/advisories/44648
- http://secunia.com/advisories/44658
- http://secunia.com/advisories/44660
- http://secunia.com/advisories/44900
- http://www.openwall.com/lists/oss-security/2011/05/19/2
- http://www.osvdb.org/73395
- http://www.securityfocus.com/bid/47927
- https://bugzilla.redhat.com/show_bug.cgi?id=699773
- https://github.com/nelhage/virtunoid
- https://hermes.opensuse.org/messages/8572547
- https://www.ubuntu.com/usn/USN-1145-1/



