First published: Fri Feb 17 2017(Updated: )
Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.8.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6058 has a severity rating that signifies a denial of service risk due to a buffer overflow vulnerability.
To fix CVE-2017-6058, upgrade QEMU to a version greater than 2.8.1.1 to mitigate the buffer overflow vulnerability.
CVE-2017-6058 affects QEMU versions up to and including 2.8.1.1 when the VLANSTRIP feature is enabled.
CVE-2017-6058 allows remote attackers to execute a denial of service attack, leading to an out-of-bounds access and crash of the QEMU process.
The buffer overflow vulnerability in CVE-2017-6058 is linked to the VLANSTRIP feature when used with the vmxnet3 device.