Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4467: Out-of-bounds Write

0
High
VulnerabilityCVE-2024-4467cvecve-2024-4467
Published: Tue Jul 02 2024 (07/02/2024, 15:57:23 UTC)
Source: CVE

Description

A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:14:49 UTC

Technical Analysis

CVE-2024-4467 is an out-of-bounds write vulnerability identified in the QEMU disk image utility (qemu-img) specifically within the 'info' command functionality. QEMU is a widely used open-source machine emulator and virtualizer, and qemu-img is a utility used to manipulate disk image files. The vulnerability is triggered when qemu-img processes a specially crafted disk image file that includes a JSON block device descriptor (json:{}), which is part of the QEMU Machine Protocol (QMP) used for describing block devices. This malformed input causes the qemu-img process on the host to consume excessive memory or CPU resources, potentially leading to a denial of service (DoS) condition. More critically, the flaw can result in unauthorized read or write operations to an existing external file on the host system, thereby compromising data confidentiality and integrity. The affected version is QEMU 4.0.0, and exploitation requires local access with low privileges and no user interaction, making it relatively easy to exploit in environments where qemu-img is accessible. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high severity due to its impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for damage is significant given QEMU's widespread use in virtualization infrastructures.

Potential Impact

The impact of CVE-2024-4467 is substantial for organizations relying on QEMU for virtualization and disk image management. Successful exploitation can lead to denial of service by exhausting host system resources, disrupting virtual machine operations and associated services. More alarmingly, the ability to read or write to external files on the host compromises data confidentiality and integrity, potentially exposing sensitive information or allowing malicious modification of critical files. This could facilitate further attacks such as privilege escalation or persistent compromise. Enterprises running QEMU in cloud environments, data centers, or development/testing infrastructures are at risk of operational disruption and data breaches. The vulnerability's local attack vector means insider threats or compromised user accounts could exploit it. Given QEMU's popularity in open-source virtualization stacks and cloud platforms, the scope of affected systems is broad, impacting organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2024-4467, organizations should immediately upgrade QEMU to a patched version beyond 4.0.0 once available. In the interim, restrict access to the qemu-img utility to trusted users only and enforce strict access controls on disk image files to prevent processing of untrusted or malformed images. Employ host-based intrusion detection systems to monitor unusual resource consumption by qemu-img processes. Consider sandboxing or containerizing qemu-img executions to limit file system access and contain potential damage. Regularly audit and monitor logs for anomalous qemu-img activity. Additionally, implement strict privilege separation and minimize the number of users with local access to hosts running QEMU. Network segmentation can reduce exposure of vulnerable hosts. Finally, maintain up-to-date backups of critical data to recover from potential data corruption or loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-05-03T09:44:14.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d26e64d7c5ea9f4b3e67d

Added to database: 5/21/2025, 1:05:42 AM

Last enriched: 2/26/2026, 3:14:49 PM

Last updated: 3/24/2026, 4:15:59 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses