[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2021-4207Date: (C)2022-05-03   (M)2024-05-16


A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor->header.width` and `cursor->header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.2CVSS Score : 4.6
Exploit Score: 1.5Exploit Score: 3.9
Impact Score: 6.0Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: HIGHAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: CHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-5133
GLSA-202208-27
https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html
https://bugzilla.redhat.com/show_bug.cgi?id=2036966
https://starlabs.sg/advisories/21-4207/

CPE    1
cpe:/a:qemu:qemu
CWE    1
CWE-362
OVAL    23
oval:org.secpod.oval:def:1505909
oval:org.secpod.oval:def:88465
oval:org.secpod.oval:def:2500706
oval:org.secpod.oval:def:88485
...

© SecPod Technologies