Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0223

Опубликовано: 04 нояб. 2014
Источник: debian
EPSS Низкий

Описание

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.0.0+dfsg-6package
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02156.html

EPSS

Процентиль: 27%
0.00093
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

redhat
около 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

nvd
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

github
около 3 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

oracle-oval
почти 11 лет назад

ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 27%
0.00093
Низкий