Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3447: Heap-based Buffer Overflow

0
Medium
VulnerabilityCVE-2024-3447cvecve-2024-3447
Published: Thu Nov 14 2024 (11/14/2024, 12:10:36 UTC)
Source: CVE

Description

A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:45:21 UTC

Technical Analysis

CVE-2024-3447 identifies a heap-based buffer overflow vulnerability in the SDHCI (Secure Digital Host Controller Interface) device emulation within QEMU version 1.5.0. The vulnerability is triggered when both the internal variable s->data_count and the size of s->fifo_buffer are set to 0x200 (512 decimal), which leads to an out-of-bounds memory access on the heap. This condition allows a malicious guest virtual machine to corrupt memory within the QEMU process running on the host system. The primary consequence of this memory corruption is a crash of the QEMU process, resulting in a denial of service (DoS) condition on the host. The attack vector requires the attacker to have high privileges within the guest VM (PR:H) but does not require user interaction (UI:N). The vulnerability affects availability (A:H) but does not impact confidentiality or integrity. The scope is considered changed (S:C) because the vulnerability in the guest VM can affect the host environment. The CVSS 3.1 base score is 6.0, reflecting a medium severity level. No known exploits have been reported in the wild, and no patches or vendor advisories are currently linked. This vulnerability is significant in virtualized environments where QEMU is used to emulate SDHCI devices, especially in cloud or multi-tenant infrastructures where untrusted guests may be present.

Potential Impact

The primary impact of CVE-2024-3447 is a denial of service condition on the host system running QEMU due to a heap-based buffer overflow triggered by a malicious guest VM. This can lead to unexpected termination of the QEMU process, causing downtime for virtual machines and potential disruption of services relying on those VMs. While the vulnerability does not allow direct compromise of host confidentiality or integrity, the loss of availability can affect critical workloads, especially in cloud service providers, hosting environments, and enterprises relying on QEMU for virtualization. The requirement for high privileges within the guest limits the attack surface to attackers who have already gained significant access inside a VM, but the ability to impact the host environment elevates the risk. Organizations with multi-tenant environments or those running untrusted or less secure guest VMs are at higher risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future.

Mitigation Recommendations

1. Upgrade QEMU to a version where this vulnerability is patched once available; monitor official QEMU releases and security advisories closely. 2. Restrict guest VM privileges to the minimum necessary to reduce the likelihood of an attacker gaining the high privileges required to exploit this vulnerability. 3. Employ strict isolation and monitoring of guest VMs, especially untrusted or externally sourced ones, to detect abnormal behavior or crashes. 4. Use security mechanisms such as SELinux, AppArmor, or seccomp to limit the impact of a compromised QEMU process. 5. Consider deploying runtime protection or memory safety tools that can detect or prevent heap overflows in QEMU processes. 6. Implement robust backup and failover strategies to minimize downtime in case of QEMU crashes. 7. Regularly audit and review virtualization configurations to ensure no unnecessary device emulations are enabled that could expose this vulnerability. 8. If immediate patching is not possible, consider disabling SDHCI device emulation if it is not required for your workloads.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2024-04-08T07:52:52.103Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbefad9

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 2/28/2026, 4:45:21 AM

Last updated: 3/26/2026, 2:39:20 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses