CVE-2017-11334Out-of-bounds Read in Qemu

Severity
4.4MEDIUMNVD
EPSS
0.0%
top 90.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 2
Latest updateMay 13

Description

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 0.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/qemu< qemu 1:2.8+dfsg-7 (bookworm)
Debianqemu/qemu< 1:2.8+dfsg-7+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.39+3
NVDqemu/qemu2.9.1

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-4j6c-x59q-c2c4: The address_space_write_continue function in exec2022-05-13
OSV
qemu regression2018-03-05
OSV
qemu vulnerabilities2018-02-20
OSV
CVE-2017-11334: The address_space_write_continue function in exec2017-08-02

📋Vendor Advisories

4
Ubuntu
QEMU regression2018-03-05
Ubuntu
QEMU vulnerabilities2018-02-20
Red Hat
Qemu: exec: oob access during dma operation2017-07-13
Debian
CVE-2017-11334: qemu - The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator)...2017

💬Community

3
Bugzilla
CVE-2017-11334 Qemu: exec: oob access during dma operation2017-07-17
Bugzilla
CVE-2017-11334 xen: Qemu: exec: oob access during dma operation [fedora-all]2017-07-17
Bugzilla
CVE-2017-11334 Qemu: exec: oob access during dma operation [fedora-all]2017-07-17