Description
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:32:55.588Z
Reserved: 2019-06-20T00:00:00.000Z
Link: CVE-2019-12929
No data.
Status : Modified
Published: 2019-06-24T11:15:09.427
Modified: 2024-11-21T04:23:50.710
Link: CVE-2019-12929
OpenCVE Enrichment
No data.