CVE-2023-6683

CVSS 3.1 Score 6.5 of 10 (medium)

Details

Published Jan 12, 2024
Updated: May 22, 2024
CWE ID 476

Summary

CVE-2023-6683 is a vulnerability affecting QEMU's built-in VNC server. The issue lies in the processing of ClientCutText messages where the qemu_clipboard_request() function is reached before the vnc_server_cut_text_caps() call. This sequence of events allows a malicious authenticated VNC client to initiate the clipboard peer before proper initialization, resulting in a NULL pointer dereference. Consequently, QEMU can be crashed, causing a denial of service.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Affected Products

  • QEMU
  • Red Hat Enterprise Linux

Affected Vendors

  • Qemu
  • Red Hat

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-6683 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions