CVE-2017-2620
Summary
| CVE | CVE-2017-2620 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-27 19:29:00 UTC |
| Updated | 2023-11-07 02:43:00 UTC |
| Description | Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. |
Risk And Classification
Problem Types: CWE-125 | CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Citrix | Xenserver | 6.0.2 | All | All | All |
| Application | Citrix | Xenserver | 6.2.0 | sp1 | All | All |
| Application | Citrix | Xenserver | 6.5 | sp1 | All | All |
| Application | Citrix | Xenserver | 7.0 | All | All | All |
| Application | Citrix | Xenserver | 7.1 | All | All | All |
| Application | Citrix | Xenserver | 6.0.2 | All | All | All |
| Application | Citrix | Xenserver | 6.2.0 | sp1 | All | All |
| Application | Citrix | Xenserver | 6.5 | sp1 | All | All |
| Application | Citrix | Xenserver | 7.0 | All | All | All |
| Application | Citrix | Xenserver | 7.1 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Operating System | Debian | Debian Linux | 7.0 | All | All | All |
| Application | Qemu | Qemu | All | All | All | All |
| Application | Qemu | Qemu | All | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
| Application | Redhat | Openstack | 10 | All | All | All |
| Application | Redhat | Openstack | 10.0 | All | All | All |
| Application | Redhat | Openstack | 5.0 | All | All | All |
| Application | Redhat | Openstack | 6.0 | All | All | All |
| Application | Redhat | Openstack | 7.0 | All | All | All |
| Application | Redhat | Openstack | 8 | All | All | All |
| Application | Redhat | Openstack | 8.0 | All | All | All |
| Application | Redhat | Openstack | 9 | All | All | All |
| Application | Redhat | Openstack | 9.0 | All | All | All |
| Application | Redhat | Openstack | 10.0 | All | All | All |
| Application | Redhat | Openstack | 5.0 | All | All | All |
| Application | Redhat | Openstack | 6.0 | All | All | All |
| Application | Redhat | Openstack | 7.0 | All | All | All |
| Application | Redhat | Openstack | 8.0 | All | All | All |
| Application | Redhat | Openstack | 9.0 | All | All | All |
| Operating System | Xen | Xen | 4.7.1 | r1 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r2 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r3 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r4 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r5 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r6 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r7 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r1 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r2 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r3 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r4 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r5 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r6 | All | All |
| Operating System | Xen | Xen | 4.7.1 | r7 | All | All |
| Operating System | Xen | Xen | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Xen: Privilege Escalation (GLSA 201703-07) — Gentoo security | GENTOO | security.gentoo.org | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Citrix XenServer Multiple Security Updates | CONFIRM | support.citrix.com | Third Party Advisory |
| Qemu CVE-2017-2620 Remote Code Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Xen Out-of-Bounds Memory Write Error in cirrus_bitblt_cputovideo() Lets Local Administrative Users on a Guest System Gain Elevated Privileges on the Host System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| [SECURITY] [DLA 1497-1] qemu security update | MLIST | lists.debian.org | |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| [SECURITY] [DLA 1270-1] xen security update | MLIST | lists.debian.org | Third Party Advisory |
| [Qemu-devel] [PATCH] cirrus: add blit_is_unsafe call to cirrus_bitblt_cp | MLIST | lists.gnu.org | Patch, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| XSA-209 - Xen Security Advisories | CONFIRM | xenbits.xen.org | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| oss-security - CVE-2017-2620 Qemu: display: cirrus: out-of-bounds access issue while in cirrus_bitblt_cputovideo | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| QEMU: Multiple vulnerabilities (GLSA 201704-01) — Gentoo Security | GENTOO | security.gentoo.org | Third Party Advisory |
| 1420484 – (CVE-2017-2620, xsa209) CVE-2017-2620 Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | CONFIRM | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 378163 Virtuozzo Linux Security Update for qemu-kvm (VZLSA-2017:0396)
- 378167 Virtuozzo Linux Security Update for qemu-kvm (VZLSA-2017:0352)
- 378279 Virtuozzo Linux Security Update for kvm-tools (VZLSA-2017:0454)
- 500813 Alpine Linux Security Update for xen
- 501229 Alpine Linux Security Update for qemu
- 504556 Alpine Linux Security Update for xen
- 505339 Alpine Linux Security Update for qemu
- 710464 Gentoo Linux Xen Privilege Escalation Vulnerability (GLSA 201703-07)
- 710523 Gentoo Linux QEMU Multiple Vulnerabilities (GLSA 201704-01)