QEMU qemu-img Vulnerability: Memory or CPU Consumption Denial of Service
CVE-2024-4467
7.8HIGH
Key Information:
Summary
A vulnerability exists in the QEMU disk image utility related to the 'info' command, where a specially crafted image file containing a specific JSON value can cause the qemu-img process to use an excessive amount of system resources. This behavior may result in resource exhaustion, potentially leading to a denial of service. The exploit can also enable unauthorized read/write access to existing external files on the host system, creating a significant security risk for affected environments.
Affected Version(s)
Advanced Virtualization for RHEL 8.2.1 8020120240708124623.863bb0db
Advanced Virtualization for RHEL 8.4.0.EUS 8040020240708093550.522a0ee4
Advanced Virtualization for RHEL 8.4.0.EUS 8040020240708093550.522a0ee4
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Red Hat would like to thank Martin Kaesberger for reporting this issue.