Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15118

Опубликовано: 27 июл. 2018
Источник: debian

Описание

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.11+dfsg-1package
qemunot-affectedstretchpackage
qemunot-affectedjessiepackage
qemunot-affectedwheezypackage
qemu-kvmnot-affectedpackage

Примечания

  • Introduced by: https://git.qemu.org/?p=qemu.git;a=commit;h=f37708f6b8

  • https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
redhat
около 8 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
nvd
больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 9.8
github
больше 3 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.