A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2023-3354 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2216478 - Issue Tracking, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/ - Mailing List |
11 Mar 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 14:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:qemu:qemu:8.1.0:rc1:*:*:*:*:*:* cpe:2.3:a:qemu:qemu:8.1.0:rc0:*:*:*:*:*:* |
24 Oct 2023, 12:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* |
|
References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MURWGXDIF2WTDXV36T6HFJDBL632AO7R/ - Mailing List | |
First Time |
Fedoraproject fedora
Fedoraproject |
29 Aug 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jul 2023, 12:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Redhat openstack Platform
Redhat Qemu Redhat enterprise Linux Qemu qemu |
|
CWE | CWE-476 | |
References | (MISC) https://access.redhat.com/security/cve/CVE-2023-3354 - Third Party Advisory | |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2216478 - Issue Tracking, Patch | |
CPE | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:* cpe:2.3:a:redhat:openstack_platform:13.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:* cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:* |
11 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-11 17:15
Updated : 2024-11-21 08:17
NVD link : CVE-2023-3354
Mitre link : CVE-2023-3354
CVE.ORG link : CVE-2023-3354
JSON object : View
Products Affected
redhat
- enterprise_linux
- openstack_platform
fedoraproject
- fedora
qemu
- qemu
CWE
CWE-476
NULL Pointer Dereference