CVE-2013-4538

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.

References

http://git.qemu.org/?p=qemu.git;a=commit;h=ead7a57df37d2187813a121308213f41591bd811

http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html

http://lists.gnu.org/archive/html/qemu-devel/2013-12/msg00394.html

http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html

Details

Source: MITRE

Published: 2014-11-04

Updated: 2020-11-02

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 1.7.1 (inclusive)

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
129192EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2019-1999)NessusHuawei Local Security Checks
high
128919EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2019-1867)NessusHuawei Local Security Checks
high
128103EulerOS 2.0 SP5 : qemu-kvm (EulerOS-SA-2019-1811)NessusHuawei Local Security Checks
high
93177SUSE SLES11 Security Update : xen (SUSE-SU-2016:1745-1)NessusSuSE Local Security Checks
critical
91249SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:1318-1)NessusSuSE Local Security Checks
critical
90759SUSE SLES11 Security Update : xen (SUSE-SU-2016:1154-1)NessusSuSE Local Security Checks
critical
90478openSUSE Security Update : xen (openSUSE-2016-439)NessusSuSE Local Security Checks
critical
90396SUSE SLED11 / SLES11 Security Update : xen (SUSE-SU-2016:0955-1)NessusSuSE Local Security Checks
critical
90260openSUSE Security Update : xen (openSUSE-2016-413)NessusSuSE Local Security Checks
critical
90186SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2016:0873-1)NessusSuSE Local Security Checks
critical
81944Mandriva Linux Security Advisory : qemu (MDVSA-2015:061)NessusMandriva Local Security Checks
high
79407Mandriva Linux Security Advisory : qemu (MDVSA-2014:220)NessusMandriva Local Security Checks
high
77570Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2342-1)NessusUbuntu Local Security Checks
high
76138SuSE 11.3 Security Update : KVM (SAT Patch Number 9302)NessusSuSE Local Security Checks
high
74047Fedora 20 : qemu-1.6.2-5.fc20 (2014-6288)NessusFedora Local Security Checks
high