CVE-2014-0143
Qemu: block: multiple integer overflow flaws
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
Múltiples desbordamientos de enteros en los controladores de bloque en QEMU, posiblemente en versiones anteriores a la 2.0.0, permiten que usuarios locales provoquen una denegación de servicio mediante un tamaño de catálogo manipulado en (1) la función parallels_open en block/parallels.c o (2) la función bochs_open en bochs.c, una gran tabla en (3) qcow2_snapshot_load_tmp en qcow2-snapshot.c o en la función (4) qcow2_grow_l1_table en qcow2-cluster.c, (5) una gran petición en la función bdrv_check_byte_request en block.c y otros controladores de bloqueo, (6) índices de clúster manipulados en la función get_refcount en qcow2-refcount.c, o (7) un gran número de bloqueos en la función cloop_open en cloop.c. Esto provoca desbordamientos de búfer, corrupción de memoria, grandes asignaciones de memoria y lesturas y escrituras fuera de límites.
Sibiao Luo discovered that QEMU incorrectly handled device hot-unplugging. A local user could possibly use this flaw to cause a denial of service. Michael S. Tsirkin discovered that QEMU incorrectly handled vmxnet3 devices. A local guest could possibly use this issue to cause a denial of service, or possibly execute arbitrary code on the host. Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. Various other issues have also been addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-03 CVE Reserved
- 2014-04-22 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=509a41bab5306181044b5fff02eadf96d9c8676a | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=afbcc40bee4ef51731102d7d4b499ee12fc182e1 | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=cab60de930684c33f67d4e32c7509b567f8c445b | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=db8a31d11d6a60f48d6817530640d75aa72a9a2f | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e3737b820b45e54b059656dc3f914f895ac7a88b | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1079140 | 2014-06-09 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0420.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0421.html | 2023-02-13 | |
http://www.debian.org/security/2014/dsa-3044 | 2023-02-13 | |
https://access.redhat.com/security/cve/CVE-2014-0143 | 2014-06-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Affected
| ||||||
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 1.7.1 Search vendor "Qemu" for product "Qemu" and version " <= 1.7.1" | - |
Affected
|