The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:32:55.588Z

Reserved: 2019-06-20T00:00:00

Link: CVE-2019-12929

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-24T11:15:09.427

Modified: 2024-11-21T04:23:50.710

Link: CVE-2019-12929

cve-icon Redhat

Severity : Low

Publid Date: 2019-06-06T00:00:00Z

Links: CVE-2019-12929 - Bugzilla

cve-icon OpenCVE Enrichment

No data.