Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1128-1 | qemu-kvm security update |
Debian DLA |
DLA-1129-1 | qemu security update |
Debian DLA |
DLA-1497-1 | qemu security update |
Debian DSA |
DSA-3991-1 | qemu security update |
EUVD |
EUVD-2017-5677 | Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write. |
Ubuntu USN |
USN-3575-1 | QEMU vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T19:20:41.309Z
Reserved: 2017-09-06T00:00:00
Link: CVE-2017-14167
No data.
Status : Deferred
Published: 2017-09-08T18:29:00.297
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-14167
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN