Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-29443
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.0
EPSS Ranking
13.1%
CVSS Severity
CVSS v3 Score
3.9
CVSS v2 Score
3.3
References
http://www.openwall.com/lists/oss-security/2021/01/18/2
https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg04685.html
https://security.netapp.com/advisory/ntap-20210304-0003/
http://www.openwall.com/lists/oss-security/2021/01/18/2
https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg04685.html
https://security.netapp.com/advisory/ntap-20210304-0003/
Products affected by CVE-2020-29443
Qemu
»
Qemu
»
Version:
5.1.0
cpe:2.3:a:qemu:qemu:5.1.0
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved