[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-3165Date: (C)2022-10-18   (M)2024-06-05


An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 6.5CVSS Score :
Exploit Score: 2.8Exploit Score:
Impact Score: 3.6Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: LOWAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: NONEAvailability:
Integrity: NONE 
Availability: HIGH 
  
Reference:
FEDORA-2022-4387579e67
FEDORA-2022-8dcdfe7297
https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
https://security.netapp.com/advisory/ntap-20221223-0006/

CPE    1
cpe:/a:qemu:qemu
CWE    1
CWE-191
OVAL    14
oval:org.secpod.oval:def:507657
oval:org.secpod.oval:def:1506676
oval:org.secpod.oval:def:2600234
oval:org.secpod.oval:def:124336
...

© SecPod Technologies