Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - QEMU: buffer overflow via virtio-gpu-3d

February 2017 by Vigil@nce

This bulletin was written by Vigil@nce : https://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker, inside a guest system, can generate a buffer overflow
via virtio-gpu-3d of QEMU, in order to trigger a denial of service
against the host system.

Impacted products: Fedora, QEMU.

Severity: 2/4.

Creation date: 20/12/2016.

DESCRIPTION OF THE VULNERABILITY

The Qemu product manages commands exported to guest userspace
process.

However, for the command VIRTIO_GPU_CMD_GET_CAPSET, QEMU accepts a
nul buffer size for the command response data. In this cas, an
overflow occurs.

An attacker, inside a guest system, can therefore generate a
buffer overflow via virtio-gpu-3d of QEMU, in order to trigger a
denial of service against the host system.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

https://vigilance.fr/vulnerability/QEMU-buffer-overflow-via-virtio-gpu-3d-21428


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts