CVE-2024-4467
Qemu-kvm: 'qemu-img info' leads to host file read/write
Severity Score
Exploit Likelihood
Affected Versions
31Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Se encontró una falla en el comando 'info' de la utilidad de imagen de disco QEMU (qemu-img). Un archivo de imagen especialmente manipulado que contenga un valor `json:{}` que describa los dispositivos de bloque en QMP podría provocar que el proceso qemu-img en el host consuma grandes cantidades de memoria o tiempo de CPU, lo que provocaría una denegación de servicio o lectura/escritura en un archivo externo existente.
An update for the virt:rhel module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-05-03 CVE Reserved
- 2024-07-02 CVE Published
- 2024-11-13 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (12)
URL | Date | SRC |
---|
URL | Date | SRC |
---|