CVE-2014-0145
Qemu: prevent possible buffer overflows
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) number of sectors in the DMG block driver (block/dmg.c).
Múltiples desbordamientos de búfer en QEMU en versiones anteriores a la 1.7.2 y en versiones 2.x anteriores a la 2.0.0 permiten que usuarios locales provoquen una denegación de servicio o que puedan ejecutar código arbitrario mediante una gran (1) tabla L1 en qcow2_snapshot_load_tmp en el controlador de bloque QCOW 2 (block/qcow2-snapshot.c) o (2) fragmento sin comprimir, (3) tamaño de fragmento, o (4) número de sectores en el controlador de bloque DMG (block/dmg.c).
Sibiao Luo discovered that QEMU incorrectly handled device hot-unplugging. A local user could possibly use this flaw to cause a denial of service. Michael S. Tsirkin discovered that QEMU incorrectly handled vmxnet3 devices. A local guest could possibly use this issue to cause a denial of service, or possibly execute arbitrary code on the host. Multiple integer overflow, input validation, logic error, and buffer overflow flaws were discovered in various QEMU block drivers. An attacker able to modify a disk image file loaded by a guest could use these flaws to crash the guest, or corrupt QEMU process memory on the host, potentially resulting in arbitrary code execution on the host with the privileges of the QEMU process. Various other issues have also been addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-03 CVE Reserved
- 2014-04-22 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c05e4667be91b46ab42b5a11babf8e84d476cc6b | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=f0dce23475b5af5da6b17b97c1765271307734b6 | X_refsource_confirm | |
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=c165f7758009a4f793c1fc19ebb69cf55313450b | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2014/03/26/8 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://lists.gnu.org/archive/html/qemu-devel/2014-03/msg04994.html | 2023-02-13 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0420.html | 2023-02-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0421.html | 2023-02-13 | |
http://www.debian.org/security/2014/dsa-3044 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1078885 | 2014-06-09 | |
https://access.redhat.com/security/cve/CVE-2014-0145 | 2014-06-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | <= 1.7.1 Search vendor "Qemu" for product "Qemu" and version " <= 1.7.1" | - |
Affected
| ||||||
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | 2.0.0 Search vendor "Qemu" for product "Qemu" and version "2.0.0" | rc0 |
Affected
| ||||||
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | 2.0.0 Search vendor "Qemu" for product "Qemu" and version "2.0.0" | rc1 |
Affected
| ||||||
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | 2.0.0 Search vendor "Qemu" for product "Qemu" and version "2.0.0" | rc2 |
Affected
| ||||||
Qemu Search vendor "Qemu" | Qemu Search vendor "Qemu" for product "Qemu" | 2.0.0 Search vendor "Qemu" for product "Qemu" and version "2.0.0" | rc3 |
Affected
|