First published: Mon Feb 06 2017(Updated: )
Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qemu | <2.9 | 2.9 |
QEMU KVM | <=2.8.1.1 | |
SUSE Linux Enterprise Desktop with Beagle | =12-sp1 | |
SUSE Linux Enterprise Server | =12-ltss | |
SUSE Linux Enterprise Server | =12-sp1 | |
SUSE Linux Enterprise for SAP | =12 | |
SUSE Linux Enterprise Software Development Kit | =12-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5898 has been classified as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2017-5898, users should update QEMU to version 2.9 or later.
CVE-2017-5898 affects local users of software built with the CCID Card device emulator support in QEMU versions prior to 2.9.
CVE-2017-5898 enables a local user to launch a denial of service attack by causing an application crash.
CVE-2017-5898 specifically impacts the emulated_apdu_from_guest function within the usb/dev-smartcard-reader.c file.