SB2021120921 - Remote code execution in QEMU
Published: December 9, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2021-3748)
The vulnerability allows a remote guest to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when in the virtio-net device of QEMU. A malicious guest can trigger the use-after-free error and execute arbitrary code on the host system with QEMU privileges.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.