Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2rf9-cmpf-qww5

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

EPSS

Процентиль: 82%
0.01712
Низкий

8.8 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
redhat
больше 8 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
nvd
почти 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
debian
почти 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) be ...

oracle-oval
больше 6 лет назад

ELSA-2018-4262: qemu security update (IMPORTANT)

EPSS

Процентиль: 82%
0.01712
Низкий

8.8 High

CVSS3

Дефекты

CWE-121