Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14378

Опубликовано: 28 июл. 2019
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the ip_reass() routine while reassembling incoming packets if the first fragment is bigger than the m->m_dat[] buffer. An attacker could use this flaw to crash the QEMU process on the host, resulting in a Denial of Service or potentially executing arbitrary code with privileges of the QEMU process.

Отчет

Red Hat OpenStack Platform:

  • This flaw impacts KVM user-mode or SLIRP networking, which is not used in Red Hat OpenStack Platform. Although updating is recommended for affected versions (see below), Red Hat OpenStack Platform environments are not vulnerable.
  • Because the flaw's impact is Low, it will not be fixed in Red Hat OpenStack Platform 9 which is retiring within a few weeks of the flaw's public date.

Меры по смягчению последствий

There is no external mitigation to prevent this out-of-bounds heap memory access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmOut of support scope
Red Hat Enterprise Linux 5xenNot affected
Red Hat Enterprise Linux 8 Advanced Virtualizationqemu-kvmAffected
Red Hat OpenShift Container Platform 4slirp4netnsNot affected
Red Hat OpenStack Platform 9 (Mitaka)qemu-kvm-rhevWill not fix
Advanced Virtualization for RHEL 8.1.0virtFixedRHBA-2019:372306.11.2019
Advanced Virtualization for RHEL 8.1.0virt-develFixedRHBA-2019:372306.11.2019
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2020:077510.03.2020
Red Hat Enterprise Linux 7qemu-kvm-maFixedRHSA-2019:396826.11.2019
Red Hat Enterprise Linux 7qemu-kvmFixedRHSA-2020:036604.02.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1734745QEMU: slirp: heap buffer overflow during packet reassembly

EPSS

Процентиль: 91%
0.06907
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

CVSS3: 8.8
nvd
почти 6 лет назад

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

CVSS3: 8.8
debian
почти 6 лет назад

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overf ...

github
около 3 лет назад

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

CVSS3: 8.8
fstec
почти 6 лет назад

Уязвимость функции ip_reass из ip_input.c библиотеки TCP-IP эмулятора Libslirp, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации

EPSS

Процентиль: 91%
0.06907
Низкий

7 High

CVSS3