Executive Summary

Informations
Name CVE-2020-10717 First vendor Publication 2020-05-04
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Overall CVSS Score 6.5
Base Score 6.5 Environmental Score 6.5
impact SubScore 4 Temporal Score 6.5
Exploitabality Sub Score 2
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Changed Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version >= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-770 Allocation of Resources Without Limits or Throttling

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 193

Sources (Detail)

Source Url
CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10717
GENTOO https://security.gentoo.org/glsa/202011-09
MISC https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg00141.html
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg00143.html
https://www.openwall.com/lists/oss-security/2020/05/04/1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
Date Informations
2024-02-02 02:11:44
  • Multiple Updates
2024-02-01 12:19:23
  • Multiple Updates
2023-11-07 21:37:27
  • Multiple Updates
2023-09-05 13:06:15
  • Multiple Updates
2023-09-05 01:19:02
  • Multiple Updates
2023-09-02 13:05:09
  • Multiple Updates
2023-09-02 01:19:19
  • Multiple Updates
2023-08-12 13:09:43
  • Multiple Updates
2023-08-12 01:18:33
  • Multiple Updates
2023-08-11 13:03:03
  • Multiple Updates
2023-08-11 01:19:10
  • Multiple Updates
2023-08-06 13:01:17
  • Multiple Updates
2023-08-06 01:18:25
  • Multiple Updates
2023-08-04 13:01:38
  • Multiple Updates
2023-08-04 01:18:40
  • Multiple Updates
2023-07-14 13:01:39
  • Multiple Updates
2023-07-14 01:18:33
  • Multiple Updates
2023-03-29 02:04:23
  • Multiple Updates
2023-03-28 12:18:49
  • Multiple Updates
2022-11-16 09:27:28
  • Multiple Updates
2022-10-11 05:27:50
  • Multiple Updates
2022-10-11 01:18:28
  • Multiple Updates
2022-10-07 21:27:51
  • Multiple Updates
2021-12-21 05:23:10
  • Multiple Updates
2021-05-05 01:37:46
  • Multiple Updates
2021-05-04 13:44:45
  • Multiple Updates
2021-04-22 02:56:53
  • Multiple Updates
2020-12-05 01:29:11
  • Multiple Updates
2020-11-14 00:22:44
  • Multiple Updates
2020-11-11 12:28:33
  • Multiple Updates
2020-11-11 01:28:19
  • Multiple Updates
2020-11-03 12:27:41
  • Multiple Updates
2020-10-24 01:27:50
  • Multiple Updates
2020-10-16 01:27:30
  • Multiple Updates
2020-10-01 12:27:06
  • Multiple Updates
2020-09-11 01:27:02
  • Multiple Updates
2020-09-10 01:27:28
  • Multiple Updates
2020-09-09 12:27:15
  • Multiple Updates
2020-09-09 01:28:40
  • Multiple Updates
2020-05-24 01:31:06
  • Multiple Updates
2020-05-23 02:35:03
  • First insertion