Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-14378Improper Handling of Exceptional Conditions in Project Libslirp

Severity
8.8HIGHNVD
EPSS
6.6%
top 8.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 29
Latest updateMay 24

Description

ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Debianqemu/qemu< 1:4.1-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-qvqc-h5c8-h785: ip_reass in ip_input2022-05-24
CVEList
CVE-2019-14378: ip_reass in ip_input2019-07-29
OSV
CVE-2019-14378: ip_reass in ip_input2019-07-29

💥Exploits & PoCs

1
Exploit-DB
QEMU - Denial of Service2019-08-20

📋Vendor Advisories

4
Ubuntu
QEMU vulnerabilities2019-11-14
Ubuntu
QEMU vulnerabilities2019-11-14
Red Hat
QEMU: slirp: heap buffer overflow during packet reassembly2019-07-28
Debian
CVE-2019-14378: qemu - ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a ...2019

💬Community

2
Bugzilla
CVE-2019-14378 qemu: slirp: heap buffer overflow during packet reassembly [fedora-all]2019-08-01
Bugzilla
CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly2019-07-31
CVE-2019-14378 — Project Libslirp vulnerability | cvebase