Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2023-3354

Published: 11 July 2023

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.

Notes

AuthorNote
Priority reason:
Limited to a denial of service in the VNC server component.
mdeslaur
VNC denial of service

Priority

Low

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
qemu
Launchpad, Ubuntu, Debian
upstream Needs triage

focal Needed

kinetic Ignored
(end of life, was deferred [2023-07-04])
bionic Needed

jammy Needed

lunar Needed

trusty Needed

xenial Needed

mantic Needed

Patches:
upstream: https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H