Vulnerability Name:

CVE-2017-8284 (CCN-214840)

Assigned:2017-02-10
Published:2017-02-10
Updated:2019-10-03
Summary:** DISPUTED ** The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail.
Note: the vendor has stated "this bug does not violate any security guarantees QEMU makes."
CVSS v3 Severity:7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.0 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-94
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2017-8284

Source: XF
Type: UNKNOWN
qemu-cve20178284-priv-esc(214840)

Source: CCN
Type: qemu GIT Repository
tcg/i386: Check the size of instruction being translated

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2017-8284

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:qemu:qemu:2.8.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.precise:def:20178284000
    V
    CVE-2017-8284 on Ubuntu 12.04 LTS (precise) - medium.
    2017-04-26
    oval:com.ubuntu.trusty:def:20178284000
    V
    CVE-2017-8284 on Ubuntu 14.04 LTS (trusty) - medium.
    2017-04-26
    oval:com.ubuntu.xenial:def:20178284000
    V
    CVE-2017-8284 on Ubuntu 16.04 LTS (xenial) - medium.
    2017-04-26
    oval:com.ubuntu.xenial:def:201782840000000
    V
    CVE-2017-8284 on Ubuntu 16.04 LTS (xenial) - medium.
    2017-04-26
    BACK
    qemu qemu 2.8.0