USB Redirector Device Emulation Flaw in QEMU Affects Several Versions
CVE-2021-3682

8.5HIGH

Key Information:

Vendor

Qemu

Status
Vendor
CVE Published:
5 August 2021

What is CVE-2021-3682?

A vulnerability exists in the USB redirector device emulation of QEMU, affecting versions prior to 6.1.0-rc2. The issue arises when packets are dropped during a bulk transfer from a SPICE client, leading to a full packet queue. This condition can be exploited by a malicious SPICE client to manipulate QEMU into calling free() with maliciously crafted heap chunk metadata. This exploitation can result in a crash of the QEMU process or, in some scenarios, allow execution of arbitrary code with the privileges of the QEMU process on the host.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

QEMU qemu 6.1.0-rc2

References

CVSS V3.1

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.