Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-12929

Опубликовано: 24 июн. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 10
CVSS3: 9.8

Описание

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

РелизСтатусПримечание
bionic

ignored

cosmic

ignored

devel

ignored

disco

ignored

esm-infra-legacy/trusty

ignored

esm-infra/bionic

ignored

esm-infra/xenial

ignored

precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

Показывать по

РелизСтатусПримечание
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 87%
0.03423
Низкий

10 Critical

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

redhat
больше 6 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

CVSS3: 9.8
nvd
больше 6 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

CVSS3: 9.8
debian
больше 6 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS co ...

CVSS3: 9.8
github
больше 3 лет назад

The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.

EPSS

Процентиль: 87%
0.03423
Низкий

10 Critical

CVSS2

9.8 Critical

CVSS3