First published: Mon Sep 26 2022(Updated: )
An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format [1]. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service condition. [1] <a href="https://github.com/rfbproto/rfbproto/blob/master/rfbproto.rst#extended-clipboard-pseudo-encoding">https://github.com/rfbproto/rfbproto/blob/master/rfbproto.rst#extended-clipboard-pseudo-encoding</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | >=6.1.0<=7.1.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
redhat/qemu | <7.2.0 | 7.2.0 |
debian/qemu | 1:5.2+dfsg-11+deb11u3 1:5.2+dfsg-11+deb11u2 1:7.2+dfsg-7+deb12u7 1:9.2.0+ds-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-3165.
The severity of CVE-2022-3165 is medium with a CVSS score of 6.5.
The affected software for CVE-2022-3165 includes QEMU versions up to 7.1.0, Ubuntu QEMU versions 1:6.2+dfsg-2ubuntu6.6 and 1:7.0+dfsg-7ubuntu2.1, Red Hat QEMU version 7.2.0, Fedora versions 36 and 37, and Debian QEMU versions 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u11, 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u2, and 1:8.1.2+ds-1.
A malicious client can exploit CVE-2022-3165 by sending a specially crafted payload message to the QEMU VNC server while processing ClientCutText messages in the extended format.
The remedy for CVE-2022-3165 is to update QEMU to the recommended versions: Ubuntu QEMU 1:6.2+dfsg-2ubuntu6.6 or 1:7.0+dfsg-7ubuntu2.1, Red Hat QEMU 7.2.0, or Debian QEMU 1:3.1+dfsg-8+deb10u8, 1:3.1+dfsg-8+deb10u11, 1:5.2+dfsg-11+deb11u3, 1:5.2+dfsg-11+deb11u2, 1:7.2+dfsg-7+deb12u2, or 1:8.1.2+ds-1.