CVE-2017-13711Use After Free in Qemu

CWE-416Use After Free8 documents6 sources
Severity
7.5HIGHNVD
EPSS
1.8%
top 17.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 1
Latest updateMay 13

Description

Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

debiandebian/qemu< qemu 1:2.10.0-1 (bookworm)
Debianqemu/qemu< 1:2.10.0-1+3
NVDqemu/qemu2.10.1

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-x5xc-9jvw-6v9f: Use-after-free vulnerability in the sofree function in slirp/socket2022-05-13
OSV
CVE-2017-13711: Use-after-free vulnerability in the sofree function in slirp/socket2017-09-01

📋Vendor Advisories

2
Red Hat
QEMU: Slirp: use-after-free when sending response2017-08-03
Debian
CVE-2017-13711: qemu - Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (a...2017

💬Community

3
Bugzilla
CVE-2017-13711 Qemu: Slirp: use-after-free when sending response [fedora-all]2017-11-02
Bugzilla
CVE-2017-13711 Qemu: Slirp: use-after-free when sending response [fedora-all]2017-08-29
Bugzilla
CVE-2017-13711 QEMU: Slirp: use-after-free when sending response2017-08-29