First published: Thu Sep 07 2017(Updated: )
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.10.2 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u12 1:9.2.0+ds-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14167 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution on the host.
To mitigate CVE-2017-14167, upgrade QEMU to the latest versions or apply the relevant patches provided by your operating system vendor.
CVE-2017-14167 affects multiple versions of QEMU and specific Debian Linux distributions including versions 8.0 and 9.0.
Local guest OS users can exploit CVE-2017-14167 by crafting specific multiboot header address values.
Exploitation of CVE-2017-14167 can lead to out-of-bounds writes, resulting in the remote execution of arbitrary code on the host machine.