发布时间: 2022年11月18日
修改时间: 2022年11月18日
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
NVD | openEuler | |
---|---|---|
Confidentiality | Low | Low |
Attack Vector | Network | Network |
CVSS评分 | 6.0 | 6.0 |
Attack Complexity | High | High |
Privileges Required | Low | Low |
Scope | Changed | Changed |
Integrity | Low | Low |
User Interaction | None | None |
Availability | Low | Low |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2020-1873 | An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host. | 2022年11月18日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | qemu | Unaffected |
KY3.4-5A | qemu | Unaffected |
KY3.5.1 | qemu | Unaffected |