{"uuid": "f3d2f56f-c679-4ae3-9e5a-0407b3d99f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4467", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17098", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-4467\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.\n\ud83d\udccf Published: 2024-07-02T15:57:23.648Z\n\ud83d\udccf Modified: 2025-05-21T01:01:21.498Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/errata/RHSA-2024:4276\n2. https://access.redhat.com/errata/RHSA-2024:4277\n3. https://access.redhat.com/errata/RHSA-2024:4278\n4. https://access.redhat.com/errata/RHSA-2024:4372\n5. https://access.redhat.com/errata/RHSA-2024:4373\n6. https://access.redhat.com/errata/RHSA-2024:4374\n7. https://access.redhat.com/errata/RHSA-2024:4420\n8. https://access.redhat.com/errata/RHSA-2024:4724\n9. https://access.redhat.com/errata/RHSA-2024:4727\n10. https://access.redhat.com/security/cve/CVE-2024-4467\n11. https://bugzilla.redhat.com/show_bug.cgi?id=2278875", "creation_timestamp": "2025-05-21T01:45:15.000000Z"}