Resource Management Errors Affecting qemu package, versions <0.9.1-9
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
8.54% (95th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-QEMU-427775
- published 24 Dec 2008
- disclosed 24 Dec 2008
Introduced: 24 Dec 2008
CVE-2008-2382 Open this link in a new tabHow to fix?
Upgrade Debian:10
qemu
to version 0.9.1-9 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream qemu
package and not the qemu
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
References
- https://security-tracker.debian.org/tracker/CVE-2008-2382
- http://www.securityfocus.com/archive/1/499502/100/0/threaded
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
- http://www.coresecurity.com/content/vnc-remote-dos
- http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://securitytracker.com/id?1021488
- http://securitytracker.com/id?1021489
- http://secunia.com/advisories/33293
- http://secunia.com/advisories/33303
- http://secunia.com/advisories/33350
- http://secunia.com/advisories/33568
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35062
- http://www.securityfocus.com/bid/32910
- http://securityreason.com/securityalert/4803
- http://www.ubuntu.com/usn/usn-776-1
- http://www.vupen.com/english/advisories/2008/3488
- http://www.vupen.com/english/advisories/2008/3489
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47561