Severity
8.8HIGHNVD
EPSS
1.1%
top 21.63%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 27
Latest updateMay 13

Description

A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDqemu/qemu< 2.9
debiandebian/qemu< qemu 1:2.8+dfsg-3 (bookworm)
Debianqemu/qemu< 1:2.8+dfsg-3+3
CVEListV5qemu/qemu2.9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2rf9-cmpf-qww5: A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 22022-05-13
OSV
CVE-2017-2630: A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 22018-07-27

📋Vendor Advisories

2
Red Hat
Qemu: nbd: oob stack write in client routine drop_sync2017-02-03
Debian
CVE-2017-2630: qemu - A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 b...2017

💬Community

1
Bugzilla
CVE-2017-2630 Qemu: nbd: oob stack write in client routine drop_sync2017-02-15