890
VMScore

CVE-2019-12929

Published: 24/06/2019 Updated: 11/04/2024
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The QMP guest_exec command in QEMU 4.0.0 and previous versions is prone to OS command injection, which allows the malicious user to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

Vendor Advisories

Impact: Low Public Date: 2019-06-06 CWE: CWE-78 Bugzilla: 1724809: CVE-2019-12929 qemu: QEMU guest agen ...