CVE Vulnerabilities

CVE-2017-15119

Uncontrolled Resource Consumption

Published: Jul 27, 2018 | Modified: Nov 21, 2024
CVSS 3.x
8.6
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
5.8 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
QemuQemu*2.11.0 (excluding)
Red Hat OpenStack Platform 10.0 (Newton)RedHatqemu-kvm-rhev-10:2.10.0-21.el7*
Red Hat OpenStack Platform 11.0 (Ocata)RedHatqemu-kvm-rhev-10:2.10.0-21.el7*
Red Hat OpenStack Platform 12.0 (Pike)RedHatqemu-kvm-rhev-10:2.10.0-21.el7*
Red Hat OpenStack Platform 8.0 (Liberty)RedHatqemu-kvm-rhev-10:2.10.0-21.el7*
Red Hat OpenStack Platform 9.0 (Mitaka)RedHatqemu-kvm-rhev-10:2.10.0-21.el7*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatqemu-kvm-rhev-10:2.10.0-21.el7*
QemuUbuntuartful*
QemuUbuntuesm-infra/xenial*
QemuUbuntuupstream*
QemuUbuntuxenial*
QemuUbuntuzesty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References