Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8608

Опубликовано: 27 янв. 2020
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

An out-of-bounds heap buffer access flaw was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in tcp_emu() routine while emulating IRC and other protocols due to unsafe usage of the snprintf(3) function. A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.

Отчет

This issue affects user-mode or SLiRP networking implementation of the QEMU emulator. Though qemu-kvm package is built with SLiRP networking support, due to its limitations, it is not used by the virtual machine guests by default. This issue affects versions of the qemu-kvm package as shipped with Red Hat Enterprise Linux 5, 6, 7, 8 and Red Hat Enterprise Linux Advanced Virtualization 8. Future qemu-kvm package updates for Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise Linux Advanced Virtualization 8 may address this issue. Red Hat Enterprise Linux 5 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This issue is currently not planned to be addressed in its future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. Red Hat OpenStack Platform:
This flaw impacts KVM user-mode or SLIRP networking, which is not used in Red Hat OpenStack Platform. Although updating is recommended for affected versions (see below), Red Hat OpenStack Platform environments are not vulnerable.

Меры по смягчению последствий

This issue can only be resolved by applying updates. Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmOut of support scope
Red Hat Enterprise Linux 5xenNot affected
Red Hat Enterprise Linux 8container-tools:1.0/slirp4netnsNot affected
Red Hat Enterprise Linux 8container-tools:2.0/slirp4netnsNot affected
Red Hat Enterprise Linux 8 Advanced Virtualizationqemu-kvmAffected
Advanced Virtualization for RHEL 8.1.1virtFixedRHSA-2020:126101.04.2020
Advanced Virtualization for RHEL 8.1.1virt-develFixedRHSA-2020:126101.04.2020
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2020:140308.04.2020
Red Hat Enterprise Linux 7qemu-kvmFixedRHSA-2020:120831.03.2020
Red Hat Enterprise Linux 7qemu-kvm-maFixedRHSA-2020:120931.03.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1798453QEMU: Slirp: potential OOB access due to unsafe snprintf() usages

EPSS

Процентиль: 83%
0.01962
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

CVSS3: 5.6
nvd
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

CVSS3: 5.6
debian
больше 5 лет назад

In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf ...

suse-cvrf
почти 5 лет назад

Security update for xen

suse-cvrf
почти 5 лет назад

Security update for xen

EPSS

Процентиль: 83%
0.01962
Низкий

5.6 Medium

CVSS3