The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability bulletin CVE-2017-9524

QEMU: denial of service against the Network Block Device server

Synthesis of the vulnerability

An attacker can start NBD connexions to QEMU, in order to trigger a denial of service.
Impacted products: Debian, Fedora, openSUSE Leap, QEMU, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Creation date: 13/06/2017.
Identifiers: CVE-2017-9524, DSA-3920-1, DSA-3925-1, FEDORA-2017-b7f1197c23, openSUSE-SU-2017:2941-1, RHSA-2017:1681-01, SUSE-SU-2017:2936-1, USN-3414-1, USN-3414-2, VIGILANCE-VUL-22953.

Description of the vulnerability

QEMU includes a "Network Block Device" server, which emulates a kind a remote raw disk.

However, when the NBS signalling is aborted at connexion time, a data structure becomes invalid, which leads to the use of an invalid pointer and a fatal exception.

An attacker can therefore start NBD connexions to QEMU, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities note. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.