CVE-2024-24474

QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.
Configurations

No configuration.

History

15 Aug 2024, 21:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-191
CWE-120

10 Jun 2024, 16:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240510-0012/ -

21 Feb 2024, 01:15

Type Values Removed Values Added
Summary Buffer Overflow vulnerability in Qemu before v.8.2.0 allows a remote attacker to execute arbitrary code via the async_len variable to the FIFO buffer component. QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.

20 Feb 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-20 18:15

Updated : 2024-08-15 21:35


NVD link : CVE-2024-24474

Mitre link : CVE-2024-24474

CVE.ORG link : CVE-2024-24474


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-191

Integer Underflow (Wrap or Wraparound)