Executive Summary

Informations
Name CVE-2017-8284 First vendor Publication 2017-04-26
Vendor Cve Last vendor Modification 2024-04-11

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7
Base Score 7 Environmental Score 7
impact SubScore 5.9 Temporal Score 7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: the vendor has stated "this bug does not violate any security guarantees QEMU makes.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8284

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 161

Sources (Detail)

Source Url
MISC https://bugs.chromium.org/p/project-zero/issues/detail?id=1122
https://github.com/qemu/qemu/commit/30663fd26c0307e414622c7a8607fbc04f92ec14

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Date Informations
2024-04-11 09:28:41
  • Multiple Updates
2024-03-21 09:28:42
  • Multiple Updates
2024-02-02 01:49:30
  • Multiple Updates
2024-02-01 12:13:58
  • Multiple Updates
2023-11-07 21:42:58
  • Multiple Updates
2023-09-05 12:47:28
  • Multiple Updates
2023-09-05 01:13:42
  • Multiple Updates
2023-09-02 12:47:01
  • Multiple Updates
2023-09-02 01:13:59
  • Multiple Updates
2023-08-22 12:42:13
  • Multiple Updates
2022-10-11 01:13:22
  • Multiple Updates
2021-05-05 01:27:15
  • Multiple Updates
2021-05-04 13:05:26
  • Multiple Updates
2021-04-22 02:18:55
  • Multiple Updates
2020-11-11 01:20:16
  • Multiple Updates
2020-11-03 12:19:53
  • Multiple Updates
2020-10-24 01:20:02
  • Multiple Updates
2020-10-16 01:19:44
  • Multiple Updates
2020-09-10 01:19:34
  • Multiple Updates
2020-09-09 12:19:39
  • Multiple Updates
2020-09-09 01:20:31
  • Multiple Updates
2020-05-24 01:22:49
  • Multiple Updates
2020-05-23 02:08:59
  • Multiple Updates
2020-05-23 01:04:25
  • Multiple Updates
2019-10-03 09:20:36
  • Multiple Updates
2019-09-27 12:10:32
  • Multiple Updates
2018-09-07 12:10:32
  • Multiple Updates
2018-02-01 12:02:52
  • Multiple Updates
2017-09-07 12:02:59
  • Multiple Updates
2017-08-01 12:03:15
  • Multiple Updates
2017-05-10 21:22:41
  • Multiple Updates
2017-04-26 21:21:25
  • First insertion