Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12617

Опубликовано: 22 июн. 2018
Источник: redhat
CVSS3: 3.8
EPSS Средний

Описание

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6qemu-kvmFix deferred
Red Hat Enterprise Linux 6virtio-winFix deferred
Red Hat Enterprise Linux 7qemu-guest-agentFix deferred
Red Hat Enterprise Linux 7qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvm-maNot affected
Red Hat Enterprise Linux 7qemu-kvm-rhevNot affected
Red Hat Enterprise Linux 7virtio-winWill not fix
Red Hat Enterprise Linux 8qemu-kvmNot affected
Red Hat Enterprise Linux 8virtio-winNot affected
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)qemu-kvm-rhevNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1594054Qemu: qemu-guest-agent: Integer overflow causes segmentation fault in qmp_guest_file_read()

EPSS

Процентиль: 97%
0.45671
Средний

3.8 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.

CVSS3: 7.5
nvd
почти 7 лет назад

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.

CVSS3: 7.5
debian
почти 7 лет назад

qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c i ...

suse-cvrf
почти 7 лет назад

Security update for qemu

suse-cvrf
почти 7 лет назад

Security update for qemu

EPSS

Процентиль: 97%
0.45671
Средний

3.8 Low

CVSS3