QEMU VNC Server ClientCutText Message Processing Vulnerability

QEMU VNC Server ClientCutText Message Processing Vulnerability

CVE-2023-6683 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.

Learn more about our Cis Benchmark Audit For Server Software.