Out-of-bounds Write Affecting qemu-project/qemu package, versions [,2.11)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
1.42% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-QEMUPROJECTQEMU-3007216
  • published26 Jan 2022
  • disclosed27 Jul 2018
  • creditUnknown

Introduced: 27 Jul 2018

CVE-2017-15118  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade qemu-project/qemu to version 2.11 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Write. A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CVSS Scores

version 3.1