[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2018-12617Date: (C)2018-06-26   (M)2024-04-19


qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
BID-104531
https://seclists.org/bugtraq/2019/May/76
EXPLOIT-DB-44925
DSA-4454
USN-3826-1
https://lists.debian.org/debian-lts-announce/2019/02/msg00041.html
https://gist.github.com/fakhrizulkifli/c7740d28efa07dafee66d4da5d857ef6
https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg03385.html

CPE    6
cpe:/o:debian:debian_linux:9.0
cpe:/o:debian:debian_linux:8.0
cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~
cpe:/a:qemu:qemu
...
CWE    1
CWE-190
OVAL    18
oval:org.secpod.oval:def:115015
oval:org.secpod.oval:def:1504385
oval:org.secpod.oval:def:89049661
oval:org.secpod.oval:def:704399
...

© SecPod Technologies