Логотип exploitDog
bind:CVE-2017-15118
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-15118

Количество 5

Количество 5

ubuntu логотип

CVE-2017-15118

больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
EPSS: Низкий
redhat логотип

CVE-2017-15118

около 8 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
EPSS: Низкий
nvd логотип

CVE-2017-15118

больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
EPSS: Низкий
debian логотип

CVE-2017-15118

больше 7 лет назад

A stack-based buffer overflow vulnerability was found in NBD server im ...

CVSS3: 8.3
EPSS: Низкий
github логотип

GHSA-p8q8-xqgv-rwvr

больше 3 лет назад

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-15118

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
2%
Низкий
больше 7 лет назад
redhat логотип
CVE-2017-15118

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
2%
Низкий
около 8 лет назад
nvd логотип
CVE-2017-15118

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 8.3
2%
Низкий
больше 7 лет назад
debian логотип
CVE-2017-15118

A stack-based buffer overflow vulnerability was found in NBD server im ...

CVSS3: 8.3
2%
Низкий
больше 7 лет назад
github логотип
GHSA-p8q8-xqgv-rwvr

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS3: 9.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу