The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Metrics
Affected Vendors & Products
References
History
Sat, 15 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:32:55.591Z
Reserved: 2019-06-20T00:00:00
Link: CVE-2019-12928

No data.

Status : Modified
Published: 2019-06-24T11:15:09.367
Modified: 2024-11-21T04:23:50.573
Link: CVE-2019-12928
