Files
CVEs-PoC/2021/CVE-2021-3409.md
T
2024-05-25 21:48:12 +02:00

18 lines
902 B
Markdown

### [CVE-2021-3409](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3409)
![](https://img.shields.io/static/v1?label=Product&message=QEMU&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20up%20to%20(including)%205.2.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-119&color=brighgreen)
### Description
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/sereok3/buffer-overflow-writeups