VM Escape Vulnerability Discovered In QEMU (Quick Emulator) Which Allowed For Code Execution

in bufferoverflow •  5 years ago 


Reportedly, a VM escape vulnerability exists in QEMU – an open source hardware virtualization emulator. The flaw, upon exploit, could allow an attacker to attack the host QEMU process resulting in a system crash or to execute arbitrary codes.

QEMU VM Escape Vulnerability


Security researcher Vishnu Dev from Team bi0S discovered a security flaw in Quick Emulator (QEMU). QEMU is an open source virtual machine monitor performing hardware virtualization.

Describing his findings in a blog post, the researcher stated that he found a heap buffer overflow vulnerability that could allow an attacker to conduct a virtual machine escape and attack the QEMU host system. The bug existed in the packet reassembly in SLiRP. As described by the researcher,

I exploited… a pointer miscalculation in network backend of QEMU. The bug is triggered when large IPv4 fragmented packets are reassembled for processing.
By exploiting the vulnerability, an attacker could execute codes at the target QEMU’s privilege level, or create a denial of service leading to a system crash. Technical details of the exploit are available in the researcher’s blog post.

Patch Rolled Out

The researcher noticed this vulnerability during a code audit. It has received the CVE ID CVE-2019-14378. RedHat has also addressed this vulnerability as evident from their advisory which states.
“A heap buffer overflow issue was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the ip_reass() routine while reassembling incoming packets if the first fragment is bigger than the m->m_dat[] buffer. An attacker could use this flaw to crash the QEMU process on the host, resulting in a Denial of Service or potentially executing arbitrary code with privileges of the QEMU process.
While there are no indications of active exploitation of the bug, fortunately, patches are also available. Since patching may require restarting the virtual machines, some downtime may arise as the respective systems update.

Let us know your thoughts in the comments.


Posted from my blog with SteemPress : https://latesthackingnews.com/2019/08/30/vm-escape-vulnerability-discovered-in-qemu-quick-emulator-which-allowed-for-code-execution/

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://securityaffairs.co/wordpress/90436/hacking/qemu-code-execution-dos-issue.html