Description
The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3920-1 | qemu security update |
Debian DSA |
DSA-3925-1 | qemu security update |
EUVD |
EUVD-2017-18455 | The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function. |
Ubuntu USN |
USN-3414-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T17:11:01.999Z
Reserved: 2017-06-09T00:00:00.000Z
Link: CVE-2017-9524
No data.
Status : Modified
Published: 2017-07-06T16:29:00.467
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9524
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN