CVE-2017-2630

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

History

08 Sep 2021, 13:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/qemu/qemu/commit/2563c9c6b8670400c48e562034b321a7cf3d9a85 -
  • (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1422415 -
References (BID) http://www.securityfocus.com/bid/96265 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/96265 - VDB Entry, Third Party Advisory
CWE CWE-119 CWE-121

Information

Published : 2018-07-27 18:29

Updated : 2023-12-10 12:44


NVD link : CVE-2017-2630

Mitre link : CVE-2017-2630

CVE.ORG link : CVE-2017-2630


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-121

Stack-based Buffer Overflow

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer