Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-0143

Опубликовано: 10 авг. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4
CVSS3: 7

Описание

Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.

РелизСтатусПримечание
devel

not-affected

2.0.0~rc1+dfsg-0ubuntu3
esm-infra-legacy/trusty

not-affected

2.0.0~rc1+dfsg-0ubuntu3
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

end of life
trusty

not-affected

2.0.0~rc1+dfsg-0ubuntu3
trusty/esm

not-affected

2.0.0~rc1+dfsg-0ubuntu3
upstream

released

1.7.2, 2.0

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

released

0.12.3+noroms-0ubuntu9.24
precise

released

1.0+noroms-0ubuntu14.17
quantal

ignored

end of life
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 26%
0.00087
Низкий

4.4 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

redhat
около 11 лет назад

Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.

CVSS3: 7
nvd
почти 8 лет назад

Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.

CVSS3: 7
debian
почти 8 лет назад

Multiple integer overflows in the block drivers in QEMU, possibly befo ...

CVSS3: 7
github
около 3 лет назад

Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.

oracle-oval
около 11 лет назад

ELSA-2014-0420: qemu-kvm security update (MODERATE)

EPSS

Процентиль: 26%
0.00087
Низкий

4.4 Medium

CVSS2

7 High

CVSS3