CNNVD-ID编号 | CNNVD-201907-1433 | CVE编号 | CVE-2019-14378 |
发布时间 | 2019-07-29 | 更新时间 | 2020-08-25 |
漏洞类型 | 缓冲区错误 | 漏洞来源 | Ubuntu,Debian,Red Hat |
危险等级 | 高危 | 威胁类型 | 远程 |
厂商 | N/A |
libslirp是一款用于在虚拟机管理程序中管理虚拟网络服务的通用TCP-IP模拟器。
libslirp 4.0.0版本中的ip_input.c文件的‘ip_reass’函数存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
目前厂商已发布升级了libslirp 缓冲区错误漏洞的补丁,libslirp 缓冲区错误漏洞的补丁获取链接:
https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210
来源:DEBIAN
来源:CONFIRM
来源:MISC
来源:REDHAT
来源:REDHAT
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00000.html
来源:REDHAT
来源:BUGTRAQ
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00008.html
来源:BUGTRAQ
来源:MISC
链接:https://gitlab.freedesktop.org/slirp/libslirp/commit/126c04acbabd7ad32c2b018fe10dfac2a3bc1210
来源:REDHAT
来源:REDHAT
来源:MISC
链接:https://blog.bi0s.in/2019/08/24/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/
来源:FEDORA
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
来源:REDHAT
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00034.html
来源:MLIST
来源:UBUNTU
来源:REDHAT
来源:DEBIAN
来源:CONFIRM
链接:https://support.f5.com/csp/article/K25423748?utm_source=f5support&utm_medium=RSS
来源:REDHAT
来源:MISC
链接:https://packetstormsecurity.com/files/154269/QEMU-Denial-Of-Service.html
来源:REDHAT
来源:UBUNTU
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192956-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192954-1.html
来源:access.redhat.com
来源:www.debian.org
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192221-1.html
来源:access.redhat.com
来源:access.redhat.com
来源:usn.ubuntu.com
来源:usn.ubuntu.com
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914151-1.html
来源:www.nsfocus.net
来源:nvd.nist.gov
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155469/Red-Hat-Security-Advisory-2019-3968-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157690/Red-Hat-Security-Advisory-2020-2126-01.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/libslirp-buffer-overflow-via-ip-reass-29926
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155337/Ubuntu-Security-Notice-USN-4191-1.html
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157888/Red-Hat-Security-Advisory-2020-2342-01.html
来源:www.auscert.org.au
来源:access.redhat.com
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156803/Red-Hat-Security-Advisory-2020-0889-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155741/Red-Hat-Security-Advisory-2019-4344-01.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154213/Debian-Security-Advisory-4506-1.html
来源:www.auscert.org.au
来源:www.ibm.com
暂无