CVE-2017-15124
Published: 9 January 2018
VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host.
Notes
Author | Note |
---|---|
mdeslaur | complex backport, not going to fix this in xenial and earlier |
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
artful |
Released
(1:2.10+dfsg-0ubuntu3.5)
|
precise |
Does not exist
|
|
trusty |
Ignored
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
|
|
zesty |
Ignored
(reached end-of-life)
|
|
Patches: upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=e2b72cb6e0443d90d7ab037858cb6834b6cca852 upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=ada8d2e4369ea49677d8672ac81bce73eefd5b54 upstream: https://git.qemu.org/?p=qemu.git;a=commit;h=f887cf165db20f405cb8805c716bd363aaadf815 |
||
qemu-kvm Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
precise |
Ignored
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
zesty |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
- http://www.openwall.com/lists/oss-security/2017/12/19/4
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03715.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03713.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03711.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg03705.html
- https://ubuntu.com/security/notices/USN-3575-1
- NVD
- Launchpad
- Debian