QEMU code_gen_buffer缓冲区本地溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1114024 漏洞类型 缓冲区溢出
发布时间 2007-11-30 更新时间 2008-08-08
CVE编号 CVE-2007-6227 CNNVD-ID CNNVD-200712-026
漏洞平台 Linux CVSS评分 7.2
|漏洞来源
https://www.exploit-db.com/exploits/30837
https://www.securityfocus.com/bid/26666
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200712-026
|漏洞详情
QEMU(又名QuickEmulator)是法国程序员法布里斯-贝拉(FabriceBellard)所研发的一套模拟处理器软件。该软件具有速度快、跨平台等特点。QEMU在处理畸形数据数据时存在漏洞,本地攻击者可能利用此漏洞导致系统崩溃。本地攻击者可以通过发送超长数据溢出QEMU的code_gen_buffer缓冲区,覆盖TranslationBlock缓冲区,导致拒绝服务的情况。
|漏洞EXP
source: http://www.securityfocus.com/bid/26666/info

QEMU is prone to a local denial-of-service vulnerability because it fails to perform adequate boundary checks when handling user-supplied input.

Attackers can exploit this issue to cause denial-of-service conditions. Given the nature of the issue, attackers may also be able to execute arbitrary code, but this has not been confirmed.

QEMU 0.9.0 is vulnerable; other versions may also be affected.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30837.rar
|受影响的产品
QEMU QEMU 0.9 Mandriva Linux Mandrake 2008.1 x86_64 Mandriva Linux Mandrake 2008.1 Mandriva Linux Mandrake 2008.0 x86_64 Mandriva Linux Mandrake 2008.0
|参考资料

来源:BID
名称:26666
链接:http://www.securityfocus.com/bid/26666
来源:BUGTRAQ
名称:20071130QEMUcode_gen_bufferoverflowPOC
链接:http://www.securityfocus.com/archive/1/archive/1/484429/100/0/threaded
来源:MANDRIVA
名称:MDVSA-2008:162
链接:http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
来源:SECUNIA
名称:29129
链接:http://secunia.com/advisories/29129
来源:XF
名称:qemu-translationblock-dos(38806)
链接:http://xforce.iss.net/xforce/xfdb/38806
来源:NSFOCUS
名称:11241
链接:http://www.nsfocus.net/vulndb/11241