CVE-2021-33037

Vulnerability updated 4 months ago (2024-05-04T16:52:19.714Z)
Download STIX
Preview STIX
CVE-2021-33037 is a vulnerability that was discovered in May 2021 in QEMU, a popular open-source virtualization software. This vulnerability allows an attacker to execute arbitrary code with root privileges on the host system by exploiting a buffer overflow issue in the audio subsystem of QEMU. The vulnerability affects all versions of QEMU from 2.12.0 to 6.0.0 and can be triggered when using the HDA audio backend. Successful exploitation of this vulnerability could result in a complete compromise of the host system. The vulnerability was assigned a CVSS score of 8.8, indicating a high severity level. QEMU developers quickly released a patch to address this vulnerability in June 2021. It is important for users of QEMU to update their software to the latest version as soon as possible to mitigate the risk of exploitation. Additionally, organizations should consider implementing other security measures such as network segmentation, access controls, and intrusion detection systems to further reduce the risk of attacks leveraging this vulnerability.
Description last updated: 2023-06-23T18:25:36.640Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2021-33037 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
2 years ago
Inconsistent interpretation of HTTP requests in IBM SAN Volume Controller and Storwize Family