A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
11 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jul 2023, 12:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-476 | |
CPE | cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:* |
|
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-3354 - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2216478 - Issue Tracking, Patch |
11 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-11 17:15
Updated : 2024-03-11 18:15
NVD link : CVE-2023-3354
Mitre link : CVE-2023-3354
CVE.ORG link : CVE-2023-3354
JSON object : View
Products Affected
qemu
- qemu
fedoraproject
- fedora
redhat
- openstack_platform
- enterprise_linux
CWE
CWE-476
NULL Pointer Dereference