Lucene search

K
cvelistRedhatCVELIST:CVE-2017-15118
HistoryJul 27, 2018 - 9:00 p.m.

CVE-2017-15118

2018-07-2721:00:00
CWE-121
redhat
www.cve.org
1

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

8.6 High

AI Score

Confidence

High

0.022 Low

EPSS

Percentile

89.6%

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

CNA Affected

[
  {
    "product": "Qemu",
    "vendor": "QEMU",
    "versions": [
      {
        "status": "affected",
        "version": "2.11"
      }
    ]
  }
]

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

8.6 High

AI Score

Confidence

High

0.022 Low

EPSS

Percentile

89.6%