6

CVE-2024-3447

Exploit

A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of  `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
QemuQemu Version < 7.2.11
QemuQemu Version >= 8.0.0 < 8.2.3
QemuQemu Version9.0.0 Update-
QemuQemu Version9.0.0 Updaterc0
QemuQemu Version9.0.0 Updaterc1
QemuQemu Version9.0.0 Updaterc2
NetappHci Compute Node Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.083
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
patrick@puiterwijk.org 6 1.5 4
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
CWE-122 Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().