CVE-2023-3354

A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
qemuqemu
𝑥
< 8.1.0
qemuqemu
8.1.0:rc0
qemuqemu
8.1.0:rc1
redhatopenstack_platform
13.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
vulnerable
bookworm
1:7.2+dfsg-7+deb12u7
fixed
trixie
1:9.2.0+ds-2
fixed
sid
1:9.2.0+ds-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
oracular
not-affected
noble
not-affected
mantic
not-affected
lunar
Fixed 1:7.2+dfsg-5ubuntu2.4
released
kinetic
ignored
jammy
Fixed 1:6.2+dfsg-2ubuntu6.16
released
focal
Fixed 1:4.2-3ubuntu6.28
released
bionic
needed
xenial
needed
trusty
ignored