Use-After-Free Vulnerability in QEMU Affecting VNC WebSocket Connections
CVE-2025-11234

7.5HIGH

What is CVE-2025-11234?

A vulnerability exists within the QIOChannelWebsock object in QEMU, which can be exploited if this object is freed while awaiting a handshake completion. This situation leads to a GSource object being leaked, potentially allowing a malicious client with network access to the VNC WebSocket port to trigger a denial of service. This occurs during the handshake phase prior to the authentication of the VNC client, posing a risk to users relying on VNC services.

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Grant Millar (Cylo) for reporting this issue.
.
CVE-2025-11234 : Use-After-Free Vulnerability in QEMU Affecting VNC WebSocket Connections