First published: Tue Mar 07 2017(Updated: )
A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu | <2.9 | 2.9 |
QEMU | <2.9.0 | |
XenServer | =6.0.2 | |
XenServer | =6.2.0-sp1 | |
XenServer | =6.5-sp1 | |
XenServer | =7.0 | |
XenServer | =7.1 | |
Red Hat OpenStack for IBM Power | =5.0 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 | |
Red Hat OpenStack for IBM Power | =8 | |
Red Hat OpenStack for IBM Power | =9 | |
Red Hat OpenStack for IBM Power | =10 | |
Debian Linux | =7.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9603 is classified as a high severity vulnerability due to the potential for remote code execution via a heap buffer overflow.
To fix CVE-2016-9603, upgrade QEMU to version 2.9 or later.
CVE-2016-9603 affects multiple versions of QEMU, Citrix XenServer, and Red Hat OpenStack among others.
Yes, CVE-2016-9603 can be exploited remotely if a privileged user on a guest machine uses a VNC client to interact with the vulnerable VNC display driver.
Exploiting CVE-2016-9603 could allow an attacker to execute arbitrary code on the guest system, compromising its integrity.