cve/2017/CVE-2017-15118.md

18 lines
862 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-15118](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15118)
![](https://img.shields.io/static/v1?label=Product&message=Qemu&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-121&color=brighgreen)
### Description
A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
### POC
#### Reference
- https://www.exploit-db.com/exploits/43194/
#### Github
No PoCs found on GitHub currently.