Qemu: vnc: null pointer dereference in qemu_clipboard_request()
CVE-2023-6683

6.5MEDIUM

Key Information:

Summary

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.

Affected Version(s)

Red Hat Enterprise Linux 8 8100020240314161907.e155f54d

Red Hat Enterprise Linux 8 8100020240314161907.e155f54d

Red Hat Enterprise Linux 9 17:8.2.0-11.el9_4

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Fiona Ebner (Proxmox) and Markus Frank (Proxmox) for reporting this issue.
.