QEMU 'nbd/client.c' Stack Buffer Overflow Vulnerability

QEMU is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.

Attackers can exploit this issue to execute arbitrary code within the context of the Qemu process. Failed exploit attempts will likely cause denial-of-service conditions.


Bugtraq ID: 96265
Class: Failure to Handle Exceptional Conditions
CVE: CVE-2017-2630

Remote: Yes
Local: No
Published: Feb 15 2017 12:00AM
Updated: Apr 15 2017 01:04AM
Credit: Prasad J Pandit
Vulnerable: QEMU QEMU 0
Gentoo Linux

Not Vulnerable:

Related Posts