High severity8.8NVD Advisory· Published Sep 8, 2017· Updated May 13, 2026
CVE-2017-14167
CVE-2017-14167
Description
Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
Affected products
3cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- www.openwall.com/lists/oss-security/2017/09/07/2nvdMailing ListPatchThird Party Advisory
- lists.nongnu.org/archive/html/qemu-devel/2017-09/msg01032.htmlnvdMailing ListPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3991nvdThird Party Advisory
- www.securityfocus.com/bid/100694nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:3368nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3369nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3466nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3470nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3471nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3472nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3473nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:3474nvdThird Party Advisory
- lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlnvdThird Party Advisory
- usn.ubuntu.com/3575-1/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.