Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-15118

Опубликовано: 27 июл. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 8.3

Описание

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

РелизСтатусПримечание
artful

released

1:2.10+dfsg-0ubuntu3.5
devel

not-affected

1:2.11+dfsg-1ubuntu1
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/xenial

not-affected

code not present
precise/esm

DNE

trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

released

2.11
xenial

not-affected

code not present
zesty

ignored

end of life

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

zesty

DNE

Показывать по

7.5 High

CVSS2

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
redhat
около 8 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
nvd
больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
debian
больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server im ...

CVSS3: 9.8
github
больше 3 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

7.5 High

CVSS2

8.3 High

CVSS3