CVE-2013-4542

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.

References

http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3c3ce981423e0d6c18af82ee62f1850c2cda5976

http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html

http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html

http://rhn.redhat.com/errata/RHSA-2014-0743.html

http://rhn.redhat.com/errata/RHSA-2014-0744.html

Details

Source: MITRE

Published: 2014-11-04

Updated: 2020-11-02

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 1.7.1 (inclusive)

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
81944Mandriva Linux Security Advisory : qemu (MDVSA-2015:061)NessusMandriva Local Security Checks
high
79407Mandriva Linux Security Advisory : qemu (MDVSA-2014:220)NessusMandriva Local Security Checks
high
79030RHEL 6 : qemu-kvm-rhev (RHSA-2014:0744)NessusRed Hat Local Security Checks
high
79029RHEL 6 : rhev-hypervisor6 3.4.0 (RHSA-2014:0674)NessusRed Hat Local Security Checks
high
77570Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2342-1)NessusUbuntu Local Security Checks
high
76907RHEL 7 : qemu-kvm (RHSA-2014:0927)NessusRed Hat Local Security Checks
high
76839CentOS 7 : qemu-kvm (CESA-2014:0927)NessusCentOS Local Security Checks
high
76748Oracle Linux 7 : qemu-kvm (ELSA-2014-0927)NessusOracle Linux Local Security Checks
high
76138SuSE 11.3 Security Update : KVM (SAT Patch Number 9302)NessusSuSE Local Security Checks
high
74490Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20140610)NessusScientific Linux Local Security Checks
high
74474CentOS 6 : qemu-kvm (CESA-2014:0743)NessusCentOS Local Security Checks
high
74461RHEL 6 : qemu-kvm (RHSA-2014:0743)NessusRed Hat Local Security Checks
high
74457Oracle Linux 6 : qemu-kvm (ELSA-2014-0743)NessusOracle Linux Local Security Checks
high
74047Fedora 20 : qemu-1.6.2-5.fc20 (2014-6288)NessusFedora Local Security Checks
high