Описание
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
Ссылки
- Broken LinkExploit
- Broken LinkExploit
- Mailing List
- Third Party Advisory
- Mailing ListPatch
- Mailing ListPatch
- Broken LinkThird Party AdvisoryVDB Entry
- Issue TrackingPatch
- ExploitIssue Tracking
- Issue Tracking
- Broken LinkExploit
- Broken LinkExploit
- Mailing List
- Third Party Advisory
- Mailing ListPatch
- Mailing ListPatch
- Broken LinkThird Party AdvisoryVDB Entry
- Issue TrackingPatch
- ExploitIssue Tracking
- Issue Tracking
Уязвимые конфигурации
Одно из
EPSS
9.9 Critical
CVSS3
8.5 High
CVSS2
Дефекты
Связанные уязвимости
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in ...
Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data transfer, (2) sending a message using incorrect integer data types, or (3) using the Fuzzy Screen Mode protocol, related to double free vulnerabilities.
EPSS
9.9 Critical
CVSS3
8.5 High
CVSS2