Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0223

Опубликовано: 12 мая 2014
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmWill not fix
OpenStack 4 for RHEL 6qemu-kvm-rhevFixedRHSA-2014:118715.09.2014
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2014:107519.08.2014
Red Hat Enterprise Linux 7qemu-kvmFixedRHSA-2014:092723.07.2014
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6qemu-kvm-rhevFixedRHSA-2014:118715.09.2014
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7qemu-kvm-rhevFixedRHSA-2014:126822.09.2014
RHEV 3.X Hypervisor and Agents for RHEL-6qemu-kvm-rhevFixedRHSA-2014:107619.08.2014
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2014:116809.09.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1097222Qemu: qcow1: validate image size to avoid out-of-bounds memory access

EPSS

Процентиль: 27%
0.00093
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

nvd
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

debian
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU bef ...

github
около 3 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

oracle-oval
почти 11 лет назад

ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 27%
0.00093
Низкий

4.3 Medium

CVSS2