SB2018072711 - Multiple vulnerabilities in QEMU QEMU 



SB2018072711 - Multiple vulnerabilities in QEMU QEMU

Published: July 27, 2018 Updated: July 17, 2020

Security Bulletin ID SB2018072711
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2013-4535)

The vulnerability allows a local authenticated user to execute arbitrary code.

The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.


2) Out-of-bounds read (CVE-ID: CVE-2017-2633)

The vulnerability allows a remote authenticated user to perform a denial of service (DoS) attack.

An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.


Remediation

Install update from vendor's website.