Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-3354


A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.


Published

2023-07-11T17:15:13.387

Last Modified

2024-11-21T08:17:05.117

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-476
  • Type: Primary
    CWE-476

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application qemu qemu < 8.1.0 Yes
Application qemu qemu 8.1.0 Yes
Application qemu qemu 8.1.0 Yes
Application redhat openstack_platform 13.0 Yes
Operating System redhat enterprise_linux 7.0 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System redhat enterprise_linux 8.0 Yes
Operating System redhat enterprise_linux 9.0 Yes
Operating System fedoraproject fedora 38 Yes

References