Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://lists.nongnu.org/archive/html/qemu-devel/2017-02/msg03527.html | patch mailing list third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1423358 | patch mitigation third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2017/02/17/2 | patch mailing list third party advisory |
https://security.gentoo.org/glsa/201704-01 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1037856 | third party advisory vdb entry |
http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=df8bf7a7fe75eb5d5caffa55f5cd4292b757aea6 | |
http://www.securityfocus.com/bid/96277 | third party advisory vdb entry |