
CVE-2013-2152 – rhevm: spice service unquoted search path
https://notcve.org/view.php?id=CVE-2013-2152
11 Jun 2013 — Unquoted Windows search path vulnerability in the SPICE service, as used in Red Hat Enterprise Virtualization (RHEV) 3.2, allows local users to gain privileges via a crafted application in an unspecified folder. Vulnerabilidad de ruta de búsqueda en Windows sin comillas en el servicio SPICE, tal como se usa en Red Hat Enterprise Virtualization (RHEV) 3.2, permite a usuarios locales obtener privilegios a través de una aplicación manipulada en una carpeta sin especificar. The rhev-guest-tools-iso package cont... • http://rhn.redhat.com/errata/RHSA-2013-0924.html • CWE-428: Unquoted Search Path or Element •

CVE-2013-0167 – vdsm: unfiltered guestInfo dictionary DoS
https://notcve.org/view.php?id=CVE-2013-0167
11 Jun 2013 — VDSM in Red Hat Enterprise Virtualization 3 and 3.2 allows privileged guest users to cause the host to become "unavailable to the managment server" via guestInfo dictionaries with "unexpected fields." VDSM en Red Hat Enterprise Virtualization 3 y 3.2, permite a usuarios invitados con privilegios provocar que la maquina anfitriona "no esté disponible para el servidor de gestión" a través de diccionarios "guestInfo" con "campos inesperados". The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualiz... • https://bugzilla.redhat.com/show_bug.cgi?id=893332 •

CVE-2013-1591 – pixman: stack-based buffer overflow
https://notcve.org/view.php?id=CVE-2013-1591
31 Jan 2013 — Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop. Desbordamiento de búfer basado en pila en libpixman, utilizado en Pale Moon anterior a 15.4, tiene un impacto y vectores de ataque no especificados. • http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f • CWE-121: Stack-based Buffer Overflow CWE-190: Integer Overflow or Wraparound •

CVE-2010-0428 – libspice: Insufficient guest provided pointers validation
https://notcve.org/view.php?id=CVE-2010-0428
24 Aug 2010 — libspice, as used in QEMU-KVM in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and qspice 0.3.0, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors. libspice, tal y como se utiliza en QEMU-KVM en el Hypervisor (alias rhev-hipervisor) de Red Hat Enterprise Virtualization (RHEV) v2.2 y qspice v0.3.0, no valida co... • https://bugzilla.redhat.com/show_bug.cgi?id=568699 • CWE-20: Improper Input Validation •

CVE-2010-0429 – libspice: Relying on guest provided data structures to indicate memory allocation
https://notcve.org/view.php?id=CVE-2010-0429
24 Aug 2010 — libspice, as used in QEMU-KVM in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and qspice 0.3.0, does not properly restrict the addresses upon which memory-management actions are performed, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors. libspice, tal y como se utiliza en QEMU-KVM en el Hypervisor (alias rhev-hipervisor) en Red Hat Enterprise Virtualization (RHEV) v2.2 y qspice v0.3.0, no re... • https://bugzilla.redhat.com/show_bug.cgi?id=568701 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-0431 – qemu: Insufficient guest provided pointers validation
https://notcve.org/view.php?id=CVE-2010-0431
24 Aug 2010 — QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors. QEMU-KVM, tal como se utiliza en el Hypervisor (alias rhev-hipervisor) en Red Hat Enterprise Virtualization (RHEV) v2.2 y KVM 83, no valida correctamente los punteros a controladore... • https://bugzilla.redhat.com/show_bug.cgi?id=568809 • CWE-20: Improper Input Validation •

CVE-2010-0435 – kvm: vmx null pointer dereference
https://notcve.org/view.php?id=CVE-2010-0435
24 Aug 2010 — The Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2, and KVM 83, when the Intel VT-x extension is enabled, allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via vectors related to instruction emulation. El Hypervisor (alias rhev-hipervisor) en Red Hat Enterprise Virtualization (RHEV) v2.2 y KVM 83, cuando la extensión Intel VT-x está activada, permite causar, a los usuarios del sistema operativo huésped, una denegación de servici... • http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html • CWE-476: NULL Pointer Dereference •

CVE-2010-2784 – qemu: insufficient constraints checking in exec.c:subpage_register()
https://notcve.org/view.php?id=CVE-2010-2784
24 Aug 2010 — The subpage MMIO initialization functionality in the subpage_register function in exec.c in QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly select the index for access to the callback array, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors. La funcionalidad de inicialización de subpaginas MMIO en la función subpage_register de exec.c en QEMU-KVM... • http://www.spinics.net/lists/kvm/msg39173.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-2811 – vdsm: SSL accept() blocks on a non-blocking Connection
https://notcve.org/view.php?id=CVE-2010-2811
24 Aug 2010 — Virtual Desktop Server Manager (VDSM) in Red Hat Enterprise Virtualization (RHEV) 2.2 does not properly accept TCP connections for SSL sessions, which allows remote attackers to cause a denial of service (daemon outage) via crafted SSL traffic. Virtual Desktop Server Manager (VDSM) en Red Hat Enterprise Virtualization (RHEV) v2.2 no acepta adecuadamente conexiones TCP para sesiones de SSL, que permite a atacantes remotos provocar una denegación de servicio (parada de demonio) a través de tráfico SSL debidam... • http://securitytracker.com/id?1024347 •

CVE-2008-3522 – jasper: possible buffer overflow in jas_stream_printf()
https://notcve.org/view.php?id=CVE-2008-3522
02 Oct 2008 — Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf. Desbordamiento de búfer en la función jas_stream_printf de libjasper/base/jas_stream.c en JasPer v1.900.1 puede permitir a atacantes dependientes de contexto tener un impacto desconocido a través de vectores relacionados con la función mif_hdr_put y la utilización de vsprintf. ... • http://bugs.gentoo.org/attachment.cgi?id=163282&action=view • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •