Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-24165

Опубликовано: 28 авг. 2023
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties.

A use-after-free vulnerability was found in the Tiny Code Generator (TCG) Accelerator in QEMU, where the TCG generated code can be in the same memory as the TB data structure. This flaw allows attackers to overwrite the UAF pointer with code produced from TCG and rewrite key pointer values, possibly leading to local privilege escalation and enabling code execution on the host outside of the TCG sandbox.

Отчет

RHEL/QEMU is neither built with TCG Accelerator, nor any layered products that use it. Bugs affecting the Tiny Code Generator (TCG) cannot be considered as security issues in QEMU as per https://www.qemu.org/docs/master/system/security.html#non-virtualization-use-case.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvm-maNot affected
Red Hat Enterprise Linux 8virt:rhel/qemu-kvmNot affected
Red Hat Enterprise Linux 8 Advanced Virtualizationvirt:av/qemu-kvmNot affected
Red Hat Enterprise Linux 9qemu-kvmNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2235745QEMU: use-after-free in TCG accelerator can lead to local privilege escalation

EPSS

Процентиль: 62%
0.00429
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 2 лет назад

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties.

CVSS3: 8.8
nvd
больше 2 лет назад

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS). Note: This is disputed as a bug and not a valid security issue by multiple third parties.

CVSS3: 8.8
debian
больше 2 лет назад

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local ...

CVSS3: 8.8
github
больше 2 лет назад

An issue was discovered in TCG Accelerator in QEMU 4.2.0, allows local attackers to execute arbitrary code, escalate privileges, and cause a denial of service (DoS).

CVSS3: 8.8
fstec
больше 2 лет назад

Уязвимость компонента TCG Accelerator эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код, повысить свои привилегии и выполнить отказ в обслуживании

EPSS

Процентиль: 62%
0.00429
Низкий

7.4 High

CVSS3