CVE-2023-3354

EUVD-2023-44021
A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 20%
Affected Products (NVD)
VendorProductVersion
qemuqemu
𝑥
< 8.1.0
qemuqemu
8.1.0:rc0
qemuqemu
8.1.0:rc1
redhatopenstack_platform
13.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
qemu
bookworm
1:7.2+dfsg-7+deb12u7
fixed
bullseye
1:5.2+dfsg-11+deb11u3
fixed
bullseye (security)
vulnerable
sid
1:9.2.0+ds-3
fixed
trixie
1:9.2.0+ds-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
qemu
bionic
needed
focal
Fixed 1:4.2-3ubuntu6.28
released
jammy
Fixed 1:6.2+dfsg-2ubuntu6.16
released
kinetic
ignored
lunar
Fixed 1:7.2+dfsg-5ubuntu2.4
released
mantic
not-affected
noble
not-affected
oracular
not-affected
trusty
ignored
xenial
needed