vendor:
QEMU Guest Agent
by:
Fakhri Zulkifli
7.5
CVSS
HIGH
Denial of Service
190
CWE
Product Name: QEMU Guest Agent
Affected Version From: 2.12.50
Affected Version To: 2.12.50
Patch Exists: YES
Related CWE: CVE-2018-12617
CPE: a:qemu:qemu
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-12617/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-12617/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2018-12617/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-12617/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2018-12617/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-12617/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=106188, https://www.infosecmatter.com/nessus-plugin-library/?id=137489, https://www.infosecmatter.com/nessus-plugin-library/?id=124947, https://www.infosecmatter.com/nessus-plugin-library/?id=106651, https://www.infosecmatter.com/nessus-plugin-library/?id=106349, https://www.infosecmatter.com/nessus-plugin-library/?id=103698, https://www.infosecmatter.com/nessus-plugin-library/?id=104268, https://www.infosecmatter.com/nessus-plugin-library/?id=105995, https://www.infosecmatter.com/nessus-plugin-library/?id=104358, https://www.infosecmatter.com/nessus-plugin-library/?id=104765
Platforms Tested: Linux
2018
QEMU Guest Agent 2.12.50 – Denial of Service
QEMU Guest Agent 2.12.50 and earlier has an integer overflow causing a g_malloc0() call to trigger a segfault() call when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a specific QMP command to the agent via the listening socket.
Mitigation:
Upgrade to QEMU Guest Agent 2.12.51 or later