CVE-2017-15118

HIGH

Qemu < 2.11 - Out-of-Bounds Write

Title source: rule
STIX 2.1

Description

A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Eric Blake · textdoslinux
https://www.exploit-db.com/exploits/43194

References (7)

Core 7
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15118
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2018:1104
Exploit, Patch, Third Party Advisory x_refsource_misc
https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3575-1/
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/101975
Mailing List, Patch, Third Party Advisory x_refsource_misc
http://www.openwall.com/lists/oss-security/2017/11/28/8
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/43194/

Scores

CVSS v3 8.3
EPSS 0.0161
EPSS Percentile 81.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Details

CWE
CWE-121 CWE-787
Status published
Products (5)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 17.10
qemu/qemu < 2.11
redhat/enterprise_linux 7.0
Published Jul 27, 2018
Tracked Since Feb 18, 2026