CVE-2017-15124
Publication date 9 January 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.
Status
Package | Ubuntu Release | Status |
---|---|---|
qemu | ||
16.04 LTS xenial | Ignored | |
14.04 LTS trusty | Ignored | |
qemu-kvm | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Notes
Patch details
Package | Patch details |
---|---|
qemu |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3575-1
- QEMU vulnerabilities
- 20 February 2018
Other references
- http://www.openwall.com/lists/oss-security/2017/12/19/4
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03715.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03713.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03711.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03705.html
- https://www.cve.org/CVERecord?id=CVE-2017-15124