Vulnerability Details : CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
Vulnerability category: Denial of service
Products affected by CVE-2024-4467
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-4467
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-4467
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Red Hat, Inc. | 2024-07-02 |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
N/A
|
N/A
|
RedHat-CVE-2024-4467 | 2024-07-02 |
CWE ids for CVE-2024-4467
-
The product does not properly control the allocation and maintenance of a limited resource.Assigned by: secalert@redhat.com (Primary)
References for CVE-2024-4467
-
https://access.redhat.com/errata/RHSA-2024:4724
-
https://access.redhat.com/security/cve/CVE-2024-4467
CVE-2024-4467- Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4727
-
https://bugzilla.redhat.com/show_bug.cgi?id=2278875
2278875 – (CVE-2024-4467) CVE-2024-4467 QEMU: 'qemu-img info' leads to host file read/write
-
http://www.openwall.com/lists/oss-security/2024/07/23/2
oss-security - [OSSA-2024-002] OpenStack Nova: Incomplete file access fix and regression for QCOW2 backing files and VMDK flat descriptors (CVE-2024-40767)
-
https://access.redhat.com/errata/RHSA-2024:4278
RHSA-2024:4278 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4420
RHSA-2024:4420 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4373
RHSA-2024:4373 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4374
RHSA-2024:4374 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4372
RHSA-2024:4372 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4276
RHSA-2024:4276 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2024:4277
RHSA-2024:4277 - Security Advisory - Red Hat Customer Portal
Jump to