8.8
CVSSv3

CVE-2019-14378

Published: 29/07/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

It exists that the LSI SCSI adapter emulator implementation in QEMU did not properly validate executed scripts. A local attacker could use this to cause a denial of service. (CVE-2019-12068)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libslirp project libslirp 4.0.0

Vendor Advisories

Debian Bug report logs - #933741 qemu: CVE-2019-14378: heap buffer overflow during packet reassembly Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 2 Aug 2019 19:12:01 UTC Severity: grave Tags: ...
Several security issues were fixed in QEMU ...
Several security issues were fixed in QEMU ...
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service, the execution of arbitrary code or bypass of ACLs For the stable distribution (buster), these problems have been fixed in version 1:31+dfsg-8+deb10u2 We recommend that you upgrade your qemu packages For the detailed security sta ...
Multiple security issues were discovered in QEMU, a fast processor emulator, which could result in denial of service, the execution of arbitrary code or bypass of ACLs In addition this update fixes a regression which could cause NBD connections to hang For the oldstable distribution (stretch), these problems have been fixed in version 1:28+dfsg- ...
ip_reass in ip_inputc in libslirp 400 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment (CVE-2019-14378) ...
Synopsis Important: qemu-kvm-rhev security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 43Red Hat Product Security has rated this ...
Synopsis Important: qemu-kvm-rhev bug fix update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat Virtualization for Red Hat Virtualization Host 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerabilit ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 130 (Queens)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm-rhev security and bug fix update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization Engine 43Red Hat Product Security has rated this update as havi ...
Synopsis Important: container-tools:rhel8 security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Im ...
Synopsis Important: container-tools:10 security and bug fix update Type/Severity Security Advisory: Important Topic An update for the container-tools:10 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common ...
Synopsis Important: qemu-kvm-ma security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 76 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 100 (Newton)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 76 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 140 (Rocky)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm-ma security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-ma is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) bas ...
Synopsis Important: qemu-kvm security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: slirp4netns security update Type/Severity Security Advisory: Important Topic An update for slirp4netns is now available for Red Hat Enterprise Linux 7 ExtrasRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CV ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base scor ...
qemu-seccompc in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread (CVE-2018-15746) A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator This flaw occurs in the ip_reass() routine whi ...
Impact: Important Public Date: 2019-07-28 CWE: CWE-122 Bugzilla: 1734745: CVE-2019-14378 QEMU: slirp: h ...

Exploits

#include <stdlibh> #include <stringh> #include <unistdh> #include <stdioh> #include <errnoh> #include <sys/typesh> #include <sys/socketh> #include <sys/socketh> #include <netinet/inh> #include <netinet/iph> #include <net/etherneth> #include <arpa/ineth> #include &lt ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2019-14378 QEMU: slirp: heap buffer overflow during packet reassembly <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...

References

CWE-787CWE-755https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210http://www.openwall.com/lists/oss-security/2019/08/01/2https://www.debian.org/security/2019/dsa-4506https://news.ycombinator.com/item?id=20799010https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/https://www.debian.org/security/2019/dsa-4512https://seclists.org/bugtraq/2019/Sep/3https://lists.debian.org/debian-lts-announce/2019/09/msg00021.htmlhttps://access.redhat.com/errata/RHSA-2019:3179https://access.redhat.com/errata/RHSA-2019:3403https://access.redhat.com/errata/RHSA-2019:3494https://access.redhat.com/errata/RHSA-2019:3742https://access.redhat.com/errata/RHSA-2019:3787https://access.redhat.com/errata/RHSA-2019:3968https://access.redhat.com/errata/RHSA-2019:4344https://access.redhat.com/errata/RHSA-2020:0366https://access.redhat.com/errata/RHSA-2020:0775https://usn.ubuntu.com/4191-1/https://support.f5.com/csp/article/K25423748http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.htmlhttp://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.htmlhttps://seclists.org/bugtraq/2019/Aug/41http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.htmlhttps://usn.ubuntu.com/4191-2/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPLHB2AN663OXAWUQURF7J2X5LHD4VD3/https://support.f5.com/csp/article/K25423748?utm_source=f5support&%3Butm_medium=RSShttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=933741https://nvd.nist.govhttps://usn.ubuntu.com/4191-1/https://www.exploit-db.com/exploits/47320