Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-2630

Опубликовано: 27 июл. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.5
CVSS3: 5.5

Описание

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

РелизСтатусПримечание
devel

not-affected

1:2.8+dfsg-3ubuntu2
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/xenial

not-affected

code not present
precise

DNE

trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

DNE

yakkety

DNE

Показывать по

Ссылки на источники

EPSS

Процентиль: 81%
0.01513
Низкий

6.5 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
redhat
больше 8 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
nvd
около 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS3: 5.5
debian
около 7 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) be ...

CVSS3: 8.8
github
больше 3 лет назад

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

oracle-oval
почти 7 лет назад

ELSA-2018-4262: qemu security update (IMPORTANT)

EPSS

Процентиль: 81%
0.01513
Низкий

6.5 Medium

CVSS2

5.5 Medium

CVSS3