A heap buffer overflow issue was found in the way SLiRP networking back-end in QEMU processes fragmented packets. It could occur while reassembling the fragmented datagrams of an incoming packet. A privileged user/process inside guest could use this flaw to crash the QEMU process resulting in DoS or potentially leverage it to execute arbitrary code on the host with privileges of the QEMU process.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | qemu-kvm | 2018-09-05 19:33 | ALAS-2018-1073 |
Amazon Linux 2 - Core | qemu-kvm | 2018-09-12 22:19 | ALAS2-2018-1073 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 5.1 | CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L |
NVD | CVSSv3 | 8.2 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
NVD | CVSSv2 | 7.2 | AV:L/AC:L/Au:N/C:C/I:C/A:C |