CVE-2018-11806

Impact:
Important
Public Date:
2018-06-05
CWE:
CWE-122
Bugzilla:
1586245: CVE-2018-11806 QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams
A heap buffer overflow issue was found in the way SLiRP networking back-end in QEMU processes fragmented packets. It could occur while reassembling the fragmented datagrams of an incoming packet. A privileged user/process inside guest could use this flaw to crash the QEMU process resulting in DoS or potentially leverage it to execute arbitrary code on the host with privileges of the QEMU process.

Find out more about CVE-2018-11806 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 5.1
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required High
User Interaction None
Scope Changed
Confidentiality Low
Integrity Impact Low
Availability Impact Low

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (qemu-kvm) RHSA-2018:2462 2018-08-16

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 8.0 (Liberty) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 13.0 (Queens) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 12.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 10 qemu-kvm-rhev Affected
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 qemu-kvm-rhev Will not fix
Red Hat Enterprise Linux 7 qemu-kvm-rhev Affected
Red Hat Enterprise Linux 7 qemu-kvm-ma Affected
Red Hat Enterprise Linux 6 qemu-kvm Affected
Red Hat Enterprise Linux 5 kvm Will not fix
Red Hat Enterprise Linux 5 xen Not affected

Acknowledgements

Red Hat would like to thank Jskz - Zero Day Initiative (trendmicro.com) for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.