CVE-2019-12929
ADVISORY - nistSummary
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
EPSS Score: 0.03423 (0.875)
Common Weakness Enumeration (CWE)
ADVISORY - nist
ADVISORY - redhat
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in