cve/2021/CVE-2021-20203.md
2025-09-29 21:09:30 +02:00

18 lines
802 B
Markdown

### [CVE-2021-20203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20203)
![](https://img.shields.io/static/v1?label=Product&message=qemu&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=versions%20up%20to%20v5.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190&color=brightgreen)
### Description
An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Live-Hack-CVE/CVE-2021-20203