First published: Tue Apr 09 2024(Updated: )
A heap based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. Upstream patch: <a href="https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/">https://patchew.org/QEMU/20240404085549.16987-1-philmd@linaro.org/</a> oss-fuzz bug: <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=58813</a>
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3447 is classified as a critical vulnerability due to the potential for a heap-based buffer overflow leading to crashes.
To mitigate CVE-2024-3447, update to the latest version of QEMU that addresses this vulnerability.
CVE-2024-3447 is triggered when both 's->data_count' and the size of 's->fifo_buffer' are incorrectly set, leading to out-of-bounds access.
Any system using vulnerable versions of QEMU may be impacted by CVE-2024-3447, especially if it processes untrusted guest data.
Exploitation of CVE-2024-3447 can lead to a crash of the QEMU process, resulting in denial of service.