{"api_version":"1","generated_at":"2026-04-23T11:32:40+00:00","cve":"CVE-2017-2630","urls":{"html":"https://cve.report/CVE-2017-2630","api":"https://cve.report/api/cve/CVE-2017-2630.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-2630","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-2630"},"summary":{"title":"CVE-2017-2630","description":"A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2018-07-27 18:29:00","updated_at":"2023-11-07 02:43:00"},"problem_types":["CWE-121"],"metrics":[],"references":[{"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg01246.html","name":"[qemu-devel] 20170206 [PATCH 05/18] nbd/client: fix drop_sync","refsource":"MLIST","tags":["Patch","Third Party Advisory"],"title":"Re: [Qemu-devel] [PATCH 05/18] nbd/client: fix drop_sync","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/96265","name":"96265","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"QEMU 'nbd/client.c' Stack Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2017/02/15/2","name":"[oss-security] 20170215 CVE-2017-2630 Qemu: nbd: oob stack write in client routine drop_sync","refsource":"MLIST","tags":["Mailing List","Patch","Third Party Advisory"],"title":"oss-security - CVE-2017-2630 Qemu: nbd: oob stack write in client routine\n drop_sync","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2017:2392","name":"RHSA-2017:2392","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630","name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630","refsource":"CONFIRM","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"1422415 – (CVE-2017-2630) CVE-2017-2630 Qemu: nbd: oob stack write in client routine drop_sync","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/qemu/qemu/commit/2563c9c6b8670400c48e562034b321a7cf3d9a85","name":"https://github.com/qemu/qemu/commit/2563c9c6b8670400c48e562034b321a7cf3d9a85","refsource":"MISC","tags":[],"title":"nbd/client: fix drop_sync [CVE-2017-2630] · qemu/qemu@2563c9c · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/201704-01","name":"GLSA-201704-01","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"QEMU: Multiple vulnerabilities (GLSA 201704-01) — Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422415","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1422415","refsource":"CONFIRM","tags":[],"title":"Bug 1422415 – CVE-2017-2630 Qemu: nbd: oob stack write in client routine drop_sync","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-2630","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2630","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"2630","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qemu","cpe5":"qemu","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2630","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qemu","cpe5":"qemu","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-2630","qid":"710523","title":"Gentoo Linux QEMU Multiple Vulnerabilities (GLSA 201704-01)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2017-2630","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Qemu:","version":{"version_data":[{"version_value":"2.9"}]}}]},"vendor_name":"QEMU"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process."}]},"impact":{"cvss":[[{"vectorString":"5.5/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L","version":"3.0"}],[{"vectorString":"4.6/AV:N/AC:H/Au:S/C:P/I:P/A:P","version":"2.0"}]]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-121"}]}]},"references":{"reference_data":[{"name":"RHSA-2017:2392","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2017:2392"},{"name":"96265","refsource":"BID","url":"http://www.securityfocus.com/bid/96265"},{"name":"GLSA-201704-01","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201704-01"},{"name":"[oss-security] 20170215 CVE-2017-2630 Qemu: nbd: oob stack write in client routine drop_sync","refsource":"MLIST","url":"http://www.openwall.com/lists/oss-security/2017/02/15/2"},{"name":"[qemu-devel] 20170206 [PATCH 05/18] nbd/client: fix drop_sync","refsource":"MLIST","url":"https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg01246.html"},{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630","refsource":"CONFIRM","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2630"},{"refsource":"CONFIRM","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1422415","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422415"},{"refsource":"MISC","name":"https://github.com/qemu/qemu/commit/2563c9c6b8670400c48e562034b321a7cf3d9a85","url":"https://github.com/qemu/qemu/commit/2563c9c6b8670400c48e562034b321a7cf3d9a85"}]}},"nvd":{"publishedDate":"2018-07-27 18:29:00","lastModifiedDate":"2023-11-07 02:43:00","problem_types":["CWE-121"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","versionEndExcluding":"2.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"2630","Ordinal":"98769","Title":"CVE-2017-2630","CVE":"CVE-2017-2630","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"2630","Ordinal":"1","NoteData":"A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"2630","Ordinal":"2","NoteData":"2018-07-27","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"2630","Ordinal":"3","NoteData":"2021-09-08","Type":"Other","Title":"Modified"}]}}}