First published: Mon Jun 24 2019(Updated: )
** DISPUTED ** The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12929 is classified as a significant vulnerability due to its potential for OS command injection leading to code execution, denial of service, or information disclosure.
To mitigate CVE-2019-12929, users should upgrade QEMU to version 4.1.0 or later, where this vulnerability has been addressed.
CVE-2019-12929 affects QEMU versions up to and including 4.0.0.
Attackers can exploit CVE-2019-12929 to achieve OS command injection, leading to potential code execution, denial of service, and information disclosure.
CVE-2019-12929 is disputed by some, but it is recognized as a significant vulnerability that needs to be addressed in vulnerable versions.