CVE-2014-0143

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.

References

http://git.qemu.org/?p=qemu.git;a=commit;h=509a41bab5306181044b5fff02eadf96d9c8676a

http://git.qemu.org/?p=qemu.git;a=commit;h=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f

http://git.qemu.org/?p=qemu.git;a=commit;h=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b

http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1

http://git.qemu.org/?p=qemu.git;a=commit;h=cab60de930684c33f67d4e32c7509b567f8c445b

http://git.qemu.org/?p=qemu.git;a=commit;h=db8a31d11d6a60f48d6817530640d75aa72a9a2f

http://git.qemu.org/?p=qemu.git;a=commit;h=e3737b820b45e54b059656dc3f914f895ac7a88b

http://rhn.redhat.com/errata/RHSA-2014-0420.html

http://rhn.redhat.com/errata/RHSA-2014-0421.html

http://www.debian.org/security/2014/dsa-3044

https://bugzilla.redhat.com/show_bug.cgi?id=1079140

Details

Source: MITRE

Published: 2017-08-10

Updated: 2019-04-22

Type: CWE-190

Risk Information

CVSS v2

Base Score: 4.4

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 1.7.1 (inclusive)

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
81944Mandriva Linux Security Advisory : qemu (MDVSA-2015:061)NessusMandriva Local Security Checks
high
79407Mandriva Linux Security Advisory : qemu (MDVSA-2014:220)NessusMandriva Local Security Checks
high
79029RHEL 6 : rhev-hypervisor6 3.4.0 (RHSA-2014:0674)NessusRed Hat Local Security Checks
high
79015RHEL 6 : qemu-kvm-rhev (RHSA-2014:0421)NessusRed Hat Local Security Checks
high
78046Debian DSA-3045-1 : qemu - security updateNessusDebian Local Security Checks
high
78045Debian DSA-3044-1 : qemu-kvm - security updateNessusDebian Local Security Checks
high
77570Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2342-1)NessusUbuntu Local Security Checks
high
77461GLSA-201408-17 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
73939SuSE 11.3 Security Update : kvm (SAT Patch Number 9142)NessusSuSE Local Security Checks
high
73818Fedora 20 : qemu-1.6.2-4.fc20 (2014-5825)NessusFedora Local Security Checks
high
73664Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20140422)NessusScientific Linux Local Security Checks
high
73663RHEL 6 : qemu-kvm (RHSA-2014:0420)NessusRed Hat Local Security Checks
high
73662Oracle Linux 6 : qemu-kvm (ELSA-2014-0420)NessusOracle Linux Local Security Checks
high
73656CentOS 6 : qemu-kvm (CESA-2014:0420)NessusCentOS Local Security Checks
high