The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
http://www.openwall.com/lists/oss-security/2017/11/28/9
http://www.securityfocus.com/bid/102011
https://access.redhat.com/errata/RHSA-2018:1104
https://access.redhat.com/errata/RHSA-2018:1113
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15119
https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05044.html
Source: MITRE
Published: 2018-07-27
Updated: 2019-10-09
Type: CWE-400
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 8.6
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Impact Score: 4
Exploitability Score: 3.9
Severity: HIGH