Vulnerability Database

328,409

Total vulnerabilities in the database

CVE-2008-2382

The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.

  • Published: Dec 24, 2008
  • Updated: Nov 9, 2025
  • CVE: CVE-2008-2382
  • Severity: Medium
  • Exploit:

CVSS v2:

  • Severity: Medium
  • Score: 5
  • AV:N/AC:L/Au:N/C:N/I:N/A:P

CWEs:

Software From Fixed in
qemu / qemu - 0.9.1.x
qemu / qemu 0.1.6 0.1.6.x
qemu / qemu 0.5.3 0.5.3.x
qemu / qemu 0.4.2 0.4.2.x
qemu / qemu 0.1.5 0.1.5.x
qemu / qemu 0.5.1 0.5.1.x
qemu / qemu 0.8.2 0.8.2.x
qemu / qemu 0.5.5 0.5.5.x
qemu / qemu 0.9.0 0.9.0.x
qemu / qemu 0.7.2 0.7.2.x
qemu / qemu 0.1.3 0.1.3.x
qemu / qemu 0.7.1 0.7.1.x
qemu / qemu 0.5.0 0.5.0.x
qemu / qemu 0.8.1 0.8.1.x
qemu / qemu 0.4.1 0.4.1.x
qemu / qemu 0.5.2 0.5.2.x
qemu / qemu 0.1.1 0.1.1.x
qemu / qemu 0.7.0 0.7.0.x
qemu / qemu 0.1.4 0.1.4.x
qemu / qemu 0.6.0 0.6.0.x
qemu / qemu 0.6.1 0.6.1.x
qemu / qemu 0.4.3 0.4.3.x
qemu / qemu 0.1.2 0.1.2.x
qemu / qemu 0.5.4 0.5.4.x
qemu / qemu 0.8.0 0.8.0.x
qemu / qemu 0.1.0 0.1.0.x
qemu / qemu 0.2.0 0.2.0.x
qemu / qemu 0.3.0 0.3.0.x
qemu / qemu 0.4.0 0.4.0.x
kvm_qumranet / kvm 59 59.x
kvm_qumranet / kvm 75 75.x
kvm_qumranet / kvm 55 55.x
kvm_qumranet / kvm 38 38.x
kvm_qumranet / kvm 68 68.x
kvm_qumranet / kvm 58 58.x
kvm_qumranet / kvm 64 64.x
kvm_qumranet / kvm 57 57.x
kvm_qumranet / kvm 63 63.x
kvm_qumranet / kvm 44 44.x
kvm_qumranet / kvm 12 12.x
kvm_qumranet / kvm 7 7.x
kvm_qumranet / kvm 40 40.x
kvm_qumranet / kvm 72 72.x
kvm_qumranet / kvm 3 3.x
kvm_qumranet / kvm 10 10.x
kvm_qumranet / kvm 39 39.x
kvm_qumranet / kvm 56 56.x
kvm_qumranet / kvm 45 45.x
kvm_qumranet / kvm 4 4.x
kvm_qumranet / kvm - 79.x
kvm_qumranet / kvm 24 24.x
kvm_qumranet / kvm 20 20.x
kvm_qumranet / kvm 51 51.x
kvm_qumranet / kvm 34 34.x
kvm_qumranet / kvm 1 1.x
kvm_qumranet / kvm 16 16.x
kvm_qumranet / kvm 21 21.x
kvm_qumranet / kvm 43 43.x
kvm_qumranet / kvm 14 14.x
kvm_qumranet / kvm 32 32.x
kvm_qumranet / kvm 53 53.x
kvm_qumranet / kvm 76 76.x
kvm_qumranet / kvm 74 74.x
kvm_qumranet / kvm 66 66.x
kvm_qumranet / kvm 73 73.x
kvm_qumranet / kvm 17 17.x
kvm_qumranet / kvm 42 42.x
kvm_qumranet / kvm 29 29.x
kvm_qumranet / kvm 33 33.x
kvm_qumranet / kvm 48 48.x
kvm_qumranet / kvm 35 35.x
kvm_qumranet / kvm 23 23.x
kvm_qumranet / kvm 69 69.x
kvm_qumranet / kvm 11 11.x
kvm_qumranet / kvm 6 6.x
kvm_qumranet / kvm 36 36.x
kvm_qumranet / kvm 26 26.x
kvm_qumranet / kvm 25 25.x
kvm_qumranet / kvm 52 52.x
kvm_qumranet / kvm 60 60.x
kvm_qumranet / kvm 70 70.x
kvm_qumranet / kvm 54 54.x
kvm_qumranet / kvm 19 19.x
kvm_qumranet / kvm 71 71.x
kvm_qumranet / kvm 9 9.x
kvm_qumranet / kvm 2 2.x
kvm_qumranet / kvm 49 49.x
kvm_qumranet / kvm 61 61.x
kvm_qumranet / kvm 65 65.x
kvm_qumranet / kvm 22 22.x
kvm_qumranet / kvm 15 15.x
kvm_qumranet / kvm 5 5.x
kvm_qumranet / kvm 8 8.x
kvm_qumranet / kvm 28 28.x
kvm_qumranet / kvm 30 30.x
kvm_qumranet / kvm 18 18.x
kvm_qumranet / kvm 27 27.x
kvm_qumranet / kvm 47 47.x
kvm_qumranet / kvm 13 13.x
kvm_qumranet / kvm 77 77.x
kvm_qumranet / kvm 50 50.x
kvm_qumranet / kvm 41 41.x
kvm_qumranet / kvm 67 67.x
kvm_qumranet / kvm 37 37.x
kvm_qumranet / kvm 78 78.x
kvm_qumranet / kvm 31 31.x
kvm_qumranet / kvm 46 46.x
kvm_qumranet / kvm 62 62.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.