Use-After-Free Vulnerability in QEMU Affecting VNC WebSocket Connections
CVE-2025-11234
7.5HIGH
What is CVE-2025-11234?
A vulnerability exists within the QIOChannelWebsock object in QEMU, which can be exploited if this object is freed while awaiting a handshake completion. This situation leads to a GSource object being leaked, potentially allowing a malicious client with network access to the VNC WebSocket port to trigger a denial of service. This occurs during the handshake phase prior to the authentication of the VNC client, posing a risk to users relying on VNC services.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Grant Millar (Cylo) for reporting this issue.