CVE-2023-3354
Published: 11 July 2023
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
Notes
Author | Note |
---|---|
Priority reason: Limited to a denial of service in the VNC server component. |
|
mdeslaur | VNC denial of service |
Priority
Status
Package | Release | Status |
---|---|---|
qemu Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
focal |
Needed
|
|
kinetic |
Ignored
(end of life, was deferred [2023-07-04])
|
|
bionic |
Needed
|
|
jammy |
Needed
|
|
lunar |
Needed
|
|
trusty |
Needed
|
|
xenial |
Needed
|
|
mantic |
Needed
|
|
Patches: upstream: https://gitlab.com/qemu-project/qemu/-/commit/10be627d2b5ec2d6b3dce045144aa739eef678b4 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |