First published: Wed Jun 21 2023(Updated: )
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU qemu | ||
Redhat Openstack Platform | =13.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
QEMU qemu | <8.1.0 | |
QEMU qemu | =8.1.0-rc0 | |
QEMU qemu | =8.1.0-rc1 | |
Fedoraproject Fedora | =38 | |
ubuntu/qemu | <1:4.2-3ubuntu6.28 | 1:4.2-3ubuntu6.28 |
ubuntu/qemu | <1:6.2+dfsg-2ubuntu6.16 | 1:6.2+dfsg-2ubuntu6.16 |
ubuntu/qemu | <1:7.2+dfsg-5ubuntu2.4 | 1:7.2+dfsg-5ubuntu2.4 |
debian/qemu | <=1:5.2+dfsg-11+deb11u2 | 1:5.2+dfsg-11+deb11u3 1:7.2+dfsg-7+deb12u7 1:9.0.2+ds-2 1:9.1.0+ds-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3354 is a vulnerability found in the QEMU built-in VNC server that allows an attacker to cause denial of service or potentially execute arbitrary code.
CVE-2023-3354 affects the QEMU built-in VNC server, specifically when a client connects to the server.
The severity of CVE-2023-3354 is rated as high.
CVE-2023-3354 can result in denial of service or potentially allow an attacker to execute arbitrary code.
To mitigate CVE-2023-3354, it is recommended to update QEMU to a patched version provided by the vendor or apply the recommended security patches.