CVE-2017-13672
QEMU: vga: OOB read access during display update
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
QEMU (también conocido como Quick Emulator), cuando se integra con soporte para emulador de pantalla VGA, permite que usuarios con privilegios de sistema operativo invitado local provoquen una denegación de servicio (lectura fuera de límites y bloqueo del proceso QEMU) mediante vectores relacionados con la actualización de pantalla.
An out-of-bounds read access issue was found in the VGA display emulator built into the Quick emulator (QEMU). It could occur while reading VGA memory to update graphics display. A privileged user/process inside guest could use this flaw to crash the QEMU process on the host resulting in denial of service situation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-24 CVE Reserved
- 2017-09-01 CVE Published
- 2017-12-22 First Exploit
- 2024-08-05 CVE Updated
- 2024-08-13 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/100540 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/DavidBuchanan314/CVE-2017-13672 | 2017-12-22 |
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2017/08/30/3 | 2020-11-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1486560 | 2018-07-10 | |
https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg04684.html | 2020-11-10 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html | 2020-11-10 | |
http://www.debian.org/security/2017/dsa-3991 | 2020-11-10 | |
https://access.redhat.com/errata/RHSA-2018:0816 | 2020-11-10 | |
https://access.redhat.com/errata/RHSA-2018:1104 | 2020-11-10 | |
https://access.redhat.com/errata/RHSA-2018:1113 | 2020-11-10 | |
https://access.redhat.com/errata/RHSA-2018:2162 | 2020-11-10 | |
https://usn.ubuntu.com/3575-1 | 2020-11-10 | |
https://access.redhat.com/security/cve/CVE-2017-13672 | 2018-07-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 2.10.2 Search vendor "Qemu" for product "Qemu" and version " <= 2.10.2" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|