First published: Tue Feb 07 2017(Updated: )
Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request, which triggers a heap-based buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5931 has a severity rating of High due to its potential to cause a denial of service and possible arbitrary code execution.
To mitigate CVE-2017-5931, upgrade to QEMU version 2.8.1.2 or later, which addresses the integer overflow vulnerability.
Local guest OS privileged users of QEMU versions prior to 2.8.1.2 are affected by CVE-2017-5931.
The impacts of CVE-2017-5931 include the possibility of a QEMU process crash and the risk of executing arbitrary code on the host.
CVE-2017-5931 specifically affects the hw/virtio/virtio-crypto.c component of QEMU.