Vulnerability Details : CVE-2017-9524
The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2017-9524
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-9524
2.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-9524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2017-9524
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-9524
-
https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg06240.html
[Qemu-devel] [PATCH] nbd: Fully initialize client in case of failed negoPatch;Third Party Advisory
-
http://www.debian.org/security/2017/dsa-3925
Debian -- Security Information -- DSA-3925-1 qemuThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2017/06/12/1
oss-security - CVE-2017-9524 Qemu: nbd: segmentation fault due to client non-negotiationMailing List;Patch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1682
RHSA-2017:1682 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:2408
RHSA-2017:2408 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/99011
QEMU CVE-2017-9524 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02321.html
[Qemu-devel] [PATCH] nbd: Fix regression on resiliency to port scanPatch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:1681
RHSA-2017:1681 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to