The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
Base Score: 7.5
Impact Score: 6.4
Exploitability Score: 10
Base Score: 9.8
Impact Score: 5.9
Exploitability Score: 3.9
|109070||RHEL 7 : Virtualization (RHSA-2018:1104)||Nessus||Red Hat Local Security Checks|
|107145||Ubuntu 14.04 LTS / 16.04 LTS : qemu regression (USN-3575-2)||Nessus||Ubuntu Local Security Checks|
|106927||Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : qemu vulnerabilities (USN-3575-1)||Nessus||Ubuntu Local Security Checks|