Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0223

Опубликовано: 12 мая 2014
Источник: redhat
CVSS2: 4.3

Описание

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmWill not fix
OpenStack 4 for RHEL 6qemu-kvm-rhevFixedRHSA-2014:118715.09.2014
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2014:107519.08.2014
Red Hat Enterprise Linux 7qemu-kvmFixedRHSA-2014:092723.07.2014
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6qemu-kvm-rhevFixedRHSA-2014:118715.09.2014
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7qemu-kvm-rhevFixedRHSA-2014:126822.09.2014
RHEV 3.X Hypervisor and Agents for RHEL-6qemu-kvm-rhevFixedRHSA-2014:107619.08.2014
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2014:116809.09.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1097222Qemu: qcow1: validate image size to avoid out-of-bounds memory access

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

nvd
около 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

debian
около 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU bef ...

github
больше 3 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

oracle-oval
около 11 лет назад

ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)

4.3 Medium

CVSS2