Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-15118
HistoryNov 28, 2017 - 12:00 a.m.

CVE-2017-15118

2017-11-2800:00:00
ubuntu.com
ubuntu.com
13

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.022

Percentile

89.6%

A stack-based buffer overflow vulnerability was found in NBD server
implementation in qemu before 2.11 allowing a client to request an export
name of size up to 4096 bytes, which in fact should be limited to 256
bytes, causing an out-of-bounds stack write in the qemu process. If NBD
server requires TLS, the attacker cannot trigger the buffer overflow
without first successfully negotiating TLS.

Bugs

Notes

Author Note
mdeslaur introduced in qemu 2.10
OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchqemu< 1:2.10+dfsg-0ubuntu3.5UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.022

Percentile

89.6%