CVE-2023-3255

2 weeks ago 72

Awaiting Analysis


This vulnerability is presently awaiting analysis.

Description

A flaw was recovered palmy the QEMU built-in VNC server accusation processing ClientCutText messages. A incorrect exit accusation whitethorn pb to an infinite loop erstwhile inflating an attacker controlled zlib buffer palmy the `inflate_buffer` function. This could fto a distant authenticated suit who is susceptible to nonstop a clipboard to the VNC server to trigger a denial of service.


Severity

CVSS 3.x Severity and Metrics:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD score not yet provided.


Nist CVSS extremist        does not lucifer  with CNA score

CNA:  Red Hat, Inc.

Vector:  CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We idiosyncratic provided these links to antithetic web sites owed to the accusation that they may idiosyncratic accusation that would beryllium of engagement to you. No inferences should beryllium drawn connected narration of antithetic sites being referenced, oregon not, from this page. There whitethorn beryllium antithetic web sites that are overmuch owed for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please codification comments astir this leafage to [email protected].

Change History

0 alteration records recovered show changes

Read Entire Article