mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
99 lines
3.5 KiB
JSON
99 lines
3.5 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2017-15124",
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "VNC server implementation in Quick Emulator (QEMU) 2.11.0 and older was found to be vulnerable to an unbounded memory allocation issue, as it did not throttle the framebuffer updates sent to its client. If the client did not consume these updates, VNC server allocates growing memory to hold onto this data. A malicious remote VNC client could use this flaw to cause DoS to the server host."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-770",
|
|
"cweId": "CWE-770"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "QEMU",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Qemu",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "2.11.0 and older"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/102295",
|
|
"refsource": "MISC",
|
|
"name": "http://www.securityfocus.com/bid/102295"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:0816",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2018:0816"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:1104",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2018:1104"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:1113",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2018:1113"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:3062",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/errata/RHSA-2018:3062"
|
|
},
|
|
{
|
|
"url": "https://usn.ubuntu.com/3575-1/",
|
|
"refsource": "MISC",
|
|
"name": "https://usn.ubuntu.com/3575-1/"
|
|
},
|
|
{
|
|
"url": "https://www.debian.org/security/2018/dsa-4213",
|
|
"refsource": "MISC",
|
|
"name": "https://www.debian.org/security/2018/dsa-4213"
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195",
|
|
"refsource": "MISC",
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195"
|
|
}
|
|
]
|
|
}
|
|
} |