Описание
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur due to an integer overflow while loading a kernel image during a guest boot. A user or process could use this flaw to potentially achieve arbitrary code execution on a host.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kvm | Not affected | ||
Red Hat Enterprise Linux 5 | xen | Not affected | ||
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected | ||
Red Hat Enterprise Linux 6 | qemu-kvm-rhev | Not affected | ||
Red Hat OpenStack Platform 12 (Pike) | qemu-kvm-rhev | Not affected | ||
Red Hat Enterprise Linux 7 | qemu-kvm | Fixed | RHSA-2017:3368 | 30.11.2017 |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | qemu-kvm-rhev | Fixed | RHSA-2017:3473 | 14.12.2017 |
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | qemu-kvm-rhev | Fixed | RHSA-2017:3472 | 14.12.2017 |
Red Hat OpenStack Platform 10.0 (Newton) | qemu-kvm-rhev | Fixed | RHSA-2017:3474 | 14.12.2017 |
Red Hat OpenStack Platform 11.0 (Ocata) | qemu-kvm-rhev | Fixed | RHSA-2017:3466 | 14.12.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
4.9 Medium
CVSS3
3.7 Low
CVSS2
Связанные уязвимости
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Integer overflow in the load_multiboot function in hw/i386/multiboot.c ...
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
EPSS
4.9 Medium
CVSS3
3.7 Low
CVSS2