#VU6943 Memory corruption in QEMU


Published: 2017-06-06 | Updated: 2017-06-08

Vulnerability identifier: #VU6943

Vulnerability risk: Low

CVSSv3.1: 2.3 [CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-8379

CWE-ID: CWE-119

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
QEMU
Client/Desktop applications / Virtualization software

Vendor: QEMU

Description
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.

Mitigation
Update to version 2.9.0-r2.

Vulnerable software versions

QEMU: 0.1 - 2.9.0


External links
http://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05599.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability