Vulnerability Name: | CVE-2019-12247 (CCN-161470) | ||||||||||||||||||||
Assigned: | 2019-05-22 | ||||||||||||||||||||
Published: | 2019-05-22 | ||||||||||||||||||||
Updated: | 2019-05-30 | ||||||||||||||||||||
Summary: | ** DISPUTED ** QEMU 3.0.0 has an Integer Overflow because the qga/commands*.c files do not check the length of the argument list or the number of environment variables. Note: This has been disputed as not exploitable. | ||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-12247 Source: BID Type: Third Party Advisory 108434 Source: XF Type: UNKNOWN qemu-cve201912247-overflow(161470) Source: MISC Type: Mailing List, Patch, Third Party Advisory https://lists.gnu.org/archive/html/qemu-devel/2019-01/msg06360.html Source: CCN Type: qemu-devel Web site Re: [Qemu-devel] [PATCH v2] qga: check length of command-line & environm Source: MISC Type: Mailing List, Patch, Third Party Advisory https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg04596.html Source: MISC Type: UNKNOWN https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg05457.html Source: CCN Type: oss-sec Mailing List, Wed, 22 May 2019 16:50:25 +0530 (IST) CVE-2019-12247 QEMU: qemu-guest-agent: integer overflow while running guest-exec command Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-12247 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |