{"id":"CVE-2013-2016","details":"A flaw was found in the way qemu v1.3.0 and later (virtio-rng) validates addresses when guest accesses the config space of a virtio device. If the virtio device has zero/small sized config space, such as virtio-rng, a privileged guest user could use this flaw to access the matching host's qemu address space and thus increase their privileges on the host.","modified":"2026-01-27T04:13:08.632661Z","published":"2019-12-30T22:15:11Z","withdrawn":"2026-01-27T04:13:08.632661Z","related":["SUSE-SU-2015:0870-1","SUSE-SU-2015:0889-1","SUSE-SU-2015:1152-1"],"references":[{"type":"FIX","url":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00002.html"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2013/04/29/5"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2013/04/29/6"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/59541"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2013-2016"},{"type":"ADVISORY","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/83850"},{"type":"FIX","url":"https://github.com/qemu/qemu/commit/5f5a1318653c08e435cfa52f60b6a712815b659d"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2013-2016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2016"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}