CWE
119 122
Advisory Published
CVE Published
Updated

CVE-2016-9603: Buffer Overflow

First published: Tue Mar 07 2017(Updated: )

A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/qemu<2.9
2.9
QEMU<2.9.0
XenServer=6.0.2
XenServer=6.2.0-sp1
XenServer=6.5-sp1
XenServer=7.0
XenServer=7.1
Red Hat OpenStack for IBM Power=5.0
Red Hat OpenStack for IBM Power=6.0
Red Hat OpenStack for IBM Power=7.0
Red Hat OpenStack for IBM Power=8
Red Hat OpenStack for IBM Power=9
Red Hat OpenStack for IBM Power=10
Debian Linux=7.0
Red Hat Enterprise Linux Desktop=6.0
Red Hat Enterprise Linux Desktop=7.0
Red Hat Enterprise Linux Server=6.0
Red Hat Enterprise Linux Server=7.0
Red Hat Enterprise Linux Server=7.3
Red Hat Enterprise Linux Server=7.4
Red Hat Enterprise Linux Server=7.3
Red Hat Enterprise Linux Server=7.4
Red Hat Enterprise Linux Server=7.5
Red Hat Enterprise Linux Workstation=6.0
Red Hat Enterprise Linux Workstation=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-9603?

    CVE-2016-9603 is classified as a high severity vulnerability due to the potential for remote code execution via a heap buffer overflow.

  • How do I fix CVE-2016-9603?

    To fix CVE-2016-9603, upgrade QEMU to version 2.9 or later.

  • Which software is affected by CVE-2016-9603?

    CVE-2016-9603 affects multiple versions of QEMU, Citrix XenServer, and Red Hat OpenStack among others.

  • Can CVE-2016-9603 be exploited remotely?

    Yes, CVE-2016-9603 can be exploited remotely if a privileged user on a guest machine uses a VNC client to interact with the vulnerable VNC display driver.

  • What are the potential consequences of exploiting CVE-2016-9603?

    Exploiting CVE-2016-9603 could allow an attacker to execute arbitrary code on the guest system, compromising its integrity.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203