Description
The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Alfredo Ortega · pythondoslinux
https://www.exploit-db.com/exploits/32675
References (19)
Core 19
Core References
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35062
Exploit vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1021489
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4803
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/3488
Vendor Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33303
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/34642
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33293
Vendor Advisory vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-776-1
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33350
Various Sources x_refsource_misc
http://www.coresecurity.com/content/vnc-remote-dos
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33568
Mailing List vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/499502/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1021488
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32910
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/3489
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47561
Scores
EPSS
0.2140
EPSS Percentile
95.7%
Details
CWE
CWE-399
Status
published
Products (50)
kvm_qumranet/kvm
1
kvm_qumranet/kvm
2
kvm_qumranet/kvm
3
kvm_qumranet/kvm
4
kvm_qumranet/kvm
5
kvm_qumranet/kvm
6
kvm_qumranet/kvm
7
kvm_qumranet/kvm
8
kvm_qumranet/kvm
9
kvm_qumranet/kvm
10
... and 40 more
Published
Dec 24, 2008
Tracked Since
Feb 18, 2026