Vulnerability Description
The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.8.1.1 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=42922105beb14c2fc5818
- http://www.openwall.com/lists/oss-security/2017/01/30/2Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/01/31/10Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/12/1Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/95885Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1417559Issue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlThird Party Advisory
- https://security.gentoo.org/glsa/201702-28Third Party Advisory
- http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=42922105beb14c2fc5818
- http://www.openwall.com/lists/oss-security/2017/01/30/2Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/01/31/10Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2017/02/12/1Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/95885Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=1417559Issue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlThird Party Advisory
FAQ
What is CVE-2017-5667?
CVE-2017-5667 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or...
How severe is CVE-2017-5667?
CVE-2017-5667 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5667?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux.