Denial of Service Vulnerability in QEMU's address_space_write_continue Function

Denial of Service Vulnerability in QEMU's address_space_write_continue Function

CVE-2017-11334 · MEDIUM Severity

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

Learn more about our User Device Pen Test.