CVE-2023-6693
Qemu: virtio-net: stack buffer overflow in virtio_net_flush_tx()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
Se encontró un desbordamiento de búfer en la región stack de la memoria en el dispositivo virtio-net de QEMU. Este problema ocurre al vaciar TX en la función virtio_net_flush_tx si las funciones de invitado VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 y VIRTIO_NET_F_MRG_RXBUF están habilitadas. Esto podría permitir que un usuario malintencionado sobrescriba las variables locales asignadas en la pila. Específicamente, la variable `out_sg` podría usarse para leer una parte de la memoria del proceso y enviarla al cable, provocando una fuga de información.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-12-11 CVE Reserved
- 2024-01-02 CVE Published
- 2024-02-08 EPSS Updated
- 2024-11-15 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
- CWE-787: Out-of-bounds Write
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGUN5HVOXESW7MSNM44E4AE2VNXQB6Y | Mailing List | |
https://security.netapp.com/advisory/ntap-20240208-0004 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2254580 | 2024-05-22 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:2962 | 2024-05-22 | |
https://access.redhat.com/security/cve/CVE-2023-6693 | 2024-05-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | < 8.2.1 Search vendor "Qemu" for product "Qemu" and version " < 8.2.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | advanced_virtualization |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 39 Search vendor "Fedoraproject" for product "Fedora" and version "39" | - |
Affected
|