Executive Summary

Informations
Name CVE-2011-3346 First vendor Publication 2014-04-01
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:H/Au:N/C:N/I:N/A:C)
Cvss Base Score 4 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity High
Cvss Expoit Score 1.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3346

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21955
 
Oval ID: oval:org.mitre.oval:def:21955
Title: RHSA-2011:1401: xen security and bug fix update (Moderate)
Description: Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.
Family: unix Class: patch
Reference(s): RHSA-2011:1401-01
CESA-2011:1401
CVE-2011-3346
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): xen
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22448
 
Oval ID: oval:org.mitre.oval:def:22448
Title: ELSA-2011:1401: xen security and bug fix update (Moderate)
Description: Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.
Family: unix Class: patch
Reference(s): ELSA-2011:1401-01
CVE-2011-3346
Version: 7
Platform(s): Oracle Linux 5
Product(s): xen
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27933
 
Oval ID: oval:org.mitre.oval:def:27933
Title: DEPRECATED: ELSA-2011-1401 -- xen security and bug fix update (moderate)
Description: [3.0.3-132.el5_7.2] - Release device backends before restarting guest on the destination machine (rhbz 743850) - Fix SCSI buffer overflow and disable SCSI CD-ROMs (rhbz 736289) [3.0.3-132.el5_7.1] - hotplug: set netback/tap MTU to the same value as the bridge MTU (rhbz 738608) - copy the MTU of the physical interface to the Xen bridge (rhbz 738610)
Family: unix Class: patch
Reference(s): ELSA-2011-1401
CVE-2011-3346
Version: 4
Platform(s): Oracle Linux 5
Product(s): xen
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 68
Os 1
Os 1

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for xen CESA-2011:1401 centos5 x86_64
File : nvt/gb_CESA-2011_1401_xen_centos5_x86_64.nasl
2011-10-31 Name : CentOS Update for xen CESA-2011:1401 centos5 i386
File : nvt/gb_CESA-2011_1401_xen_centos5_i386.nasl
2011-10-31 Name : RedHat Update for xen RHSA-2011:1401-01
File : nvt/gb_RHSA-2011_1401-01_xen.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
75279 Qemu hw/scsi-disk.c scsi_disk_emulate_command() Function Command Parsing Loca...

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2011-95.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-1401.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111024_xen_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2011-10-25 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-1401.nasl - Type : ACT_GATHER_INFO
2011-10-25 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1401.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=736038
https://github.com/bonzini/qemu/commit/103b40f51e4012b3b0ad20f615562a1806d7f49a
https://github.com/bonzini/qemu/commit/7285477ab11831b1cf56e45878a89170dd06d9b9
MISC http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
MLIST http://www.openwall.com/lists/oss-security/2011/10/20/2
REDHAT http://www.redhat.com/support/errata/RHSA-2011-1401.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Date Informations
2024-02-02 01:17:06
  • Multiple Updates
2024-02-01 12:05:01
  • Multiple Updates
2023-11-07 21:45:37
  • Multiple Updates
2023-09-05 12:16:03
  • Multiple Updates
2023-09-05 01:04:53
  • Multiple Updates
2023-09-02 12:16:07
  • Multiple Updates
2023-09-02 01:04:58
  • Multiple Updates
2023-08-12 12:19:31
  • Multiple Updates
2023-08-12 01:04:59
  • Multiple Updates
2023-08-11 12:16:13
  • Multiple Updates
2023-08-11 01:05:08
  • Multiple Updates
2023-08-06 12:15:35
  • Multiple Updates
2023-08-06 01:04:59
  • Multiple Updates
2023-08-04 12:15:39
  • Multiple Updates
2023-08-04 01:05:00
  • Multiple Updates
2023-07-14 12:15:39
  • Multiple Updates
2023-07-14 01:04:58
  • Multiple Updates
2023-03-29 01:17:32
  • Multiple Updates
2023-03-28 12:05:04
  • Multiple Updates
2023-02-13 09:28:13
  • Multiple Updates
2022-10-11 12:13:57
  • Multiple Updates
2022-10-11 01:04:43
  • Multiple Updates
2021-05-05 01:09:19
  • Multiple Updates
2021-05-04 12:17:31
  • Multiple Updates
2021-04-22 01:20:50
  • Multiple Updates
2020-11-03 12:07:03
  • Multiple Updates
2020-05-23 01:46:37
  • Multiple Updates
2020-05-23 00:31:04
  • Multiple Updates
2018-09-07 12:06:03
  • Multiple Updates
2016-06-28 18:49:05
  • Multiple Updates
2014-06-14 13:31:32
  • Multiple Updates
2014-04-01 21:22:08
  • Multiple Updates
2014-04-01 14:39:43
  • First insertion