Overview
- Description
- A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero.
- Source
- patrick@puiterwijk.org
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 7.4
- Impact score
- 5.9
- Exploitability score
- 1.4
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- patrick@puiterwijk.org
- CWE-122
Social media
- Hype score
- Not currently trending
🔴New vulnerability was just published🔴 CVE ➡️ CVE-2024-7730 Impacting ➡️ QEMU CVSS ➡️ 7.4 #cve #securitricks #vulnerability #cybersecurity https://t.co/kwc9GGaz06
@SecuriTricks
14 Nov 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-7730 A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not… https://t.co/R03Jmz9XrU
@CVEnew
14 Nov 2024
99 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes