Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-12929

Опубликовано: 24 июн. 2019
Источник: debian
EPSS Низкий

Описание

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemuunfixedpackage
qemu-kvmremovedpackage

Примечания

  • https://fakhrizulkifli.github.io/posts/2019/06/06/CVE-2019-12929/

  • The QEMU machine protocol (QMP) should not be exposed to unprivileged users,

  • and is only intended for administrative control of QEMU instances.

EPSS

Процентиль: 87%
0.03423
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

redhat
больше 6 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

CVSS3: 9.8
nvd
больше 6 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

CVSS3: 9.8
github
больше 3 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.

EPSS

Процентиль: 87%
0.03423
Низкий