SB2021120921 - Remote code execution in QEMU



SB2021120921 - Remote code execution in QEMU

Published: December 9, 2021

Security Bulletin ID SB2021120921
Severity
High
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use-after-free (CVE-ID: CVE-2021-3748)

The vulnerability allows a remote guest to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when in the virtio-net device of QEMU. A malicious guest can trigger the use-after-free error and execute arbitrary code on the host system with QEMU privileges.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.