CVE-2018-17963

Impact:
Moderate
Public Date:
2018-05-21
CWE:
CWE-121
Bugzilla:
1636777: CVE-2018-17963 QEMU: net: ignore packets with large size
A potential integer overflow issue was found in the networking back-end of QEMU. It could occur while receiving packets, because it accepted packets with large size value. Such overflow could lead to OOB buffer access issue. A user inside guest could use this flaw to crash the QEMU process resulting in DoS.

Find out more about CVE-2018-17963 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact Low
Availability Impact High

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 8.0 (Liberty) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 14 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 13.0 (Queens) qemu-kvm-rhev Affected
Red Hat OpenStack Platform 12.0 qemu-kvm-rhev Affected
Red Hat OpenStack Platform 10 qemu-kvm-rhev Affected
Red Hat Enterprise Linux 7 qemu-kvm Affected
Red Hat Enterprise Linux 7 qemu-kvm-rhev Affected
Red Hat Enterprise Linux 7 qemu-kvm-ma Affected
Red Hat Enterprise Linux 6 qemu-kvm Affected
Red Hat Enterprise Linux 5 kvm Not affected

Acknowledgements

Red Hat would like to thank Daniel Shapira (Twistlock) for reporting this issue.
Last Modified