Vulnerability Description
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.11.1 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.5 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103181Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1369Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2462Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1549798Issue TrackingVendor Advisory
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-f49v-
- https://lists.debian.org/debian-lts-announce/2018/04/msg00015.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/04/msg00016.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlMailing ListThird Party Advisory
- https://lists.gnu.org/archive/html/qemu-devel/2018-02/msg06890.htmlMailing ListPatch
- https://usn.ubuntu.com/3649-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4213Third Party Advisory
- http://www.securityfocus.com/bid/103181Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1369Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2462Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1549798Issue TrackingVendor Advisory
FAQ
What is CVE-2018-7550?
CVE-2018-7550 is a vulnerability with a CVSS score of 8.8 (HIGH). The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_...
How severe is CVE-2018-7550?
CVE-2018-7550 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7550?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.