Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-2630

Опубликовано: 27 июл. 2018
Источник: nvd
CVSS3: 5.5
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Версия до 2.9 (исключая)

EPSS

Процентиль: 82%
0.01712
Низкий

5.5 Medium

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-121
CWE-119

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
redhat
больше 8 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
debian
почти 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) be ...

CVSS3: 8.8
github
около 3 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

oracle-oval
больше 6 лет назад

ELSA-2018-4262: qemu security update (IMPORTANT)

EPSS

Процентиль: 82%
0.01712
Низкий

5.5 Medium

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-121
CWE-119