Use-after-free vulnerability in qemu-kvm allows for guest crash and potential code execution

Use-after-free vulnerability in qemu-kvm allows for guest crash and potential code execution

CVE-2011-1751 · HIGH Severity

AV:A/AC:M/AU:S/C:C/I:C/A:C

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

Learn more about our User Device Pen Test.