QEMU qemu-img Vulnerability: Memory or CPU Consumption Denial of Service
CVE-2024-4467

7.8HIGH

Summary

A vulnerability exists in the QEMU disk image utility related to the 'info' command, where a specially crafted image file containing a specific JSON value can cause the qemu-img process to use an excessive amount of system resources. This behavior may result in resource exhaustion, potentially leading to a denial of service. The exploit can also enable unauthorized read/write access to existing external files on the host system, creating a significant security risk for affected environments.

Affected Version(s)

Advanced Virtualization for RHEL 8.2.1 8020120240708124623.863bb0db

Advanced Virtualization for RHEL 8.4.0.EUS 8040020240708093550.522a0ee4

Advanced Virtualization for RHEL 8.4.0.EUS 8040020240708093550.522a0ee4

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

Red Hat would like to thank Martin Kaesberger for reporting this issue.
.