CVE-2014-0150

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.

References

http://article.gmane.org/gmane.comp.emulators.qemu/266768

http://secunia.com/advisories/57878

http://secunia.com/advisories/58191

http://thread.gmane.org/gmane.comp.emulators.qemu/266713

http://www.debian.org/security/2014/dsa-2909

http://www.debian.org/security/2014/dsa-2910

http://www.ubuntu.com/usn/USN-2182-1

https://bugzilla.redhat.com/show_bug.cgi?id=1078846

Details

Source: MITRE

Published: 2014-04-18

Updated: 2020-11-02

Type: CWE-189

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:A/AC:M/Au:S/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 4.4

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 2.0 (inclusive)

cpe:2.3:a:qemu:qemu:*:-:*:*:*:*:*:* versions up to 2.0.0 (inclusive)

cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Tenable Plugins

View all (17 total)

IDNameProductFamilySeverity
81944Mandriva Linux Security Advisory : qemu (MDVSA-2015:061)NessusMandriva Local Security Checks
high
79902Fedora 21 : xen-4.4.1-9.fc21 (2014-15951)NessusFedora Local Security Checks
high
79652Fedora 20 : xen-4.3.3-5.fc20 (2014-15521)NessusFedora Local Security Checks
high
79651Fedora 19 : xen-4.2.5-5.fc19 (2014-15503)NessusFedora Local Security Checks
high
79407Mandriva Linux Security Advisory : qemu (MDVSA-2014:220)NessusMandriva Local Security Checks
high
79029RHEL 6 : rhev-hypervisor6 3.4.0 (RHSA-2014:0674)NessusRed Hat Local Security Checks
high
79015RHEL 6 : qemu-kvm-rhev (RHSA-2014:0421)NessusRed Hat Local Security Checks
high
77461GLSA-201408-17 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
76138SuSE 11.3 Security Update : KVM (SAT Patch Number 9302)NessusSuSE Local Security Checks
high
73818Fedora 20 : qemu-1.6.2-4.fc20 (2014-5825)NessusFedora Local Security Checks
high
73752Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 / 14.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2182-1)NessusUbuntu Local Security Checks
high
73664Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20140422)NessusScientific Linux Local Security Checks
high
73663RHEL 6 : qemu-kvm (RHSA-2014:0420)NessusRed Hat Local Security Checks
high
73662Oracle Linux 6 : qemu-kvm (ELSA-2014-0420)NessusOracle Linux Local Security Checks
high
73656CentOS 6 : qemu-kvm (CESA-2014:0420)NessusCentOS Local Security Checks
high
73626Debian DSA-2910-1 : qemu-kvm - security updateNessusDebian Local Security Checks
medium
73625Debian DSA-2909-1 : qemu - security updateNessusDebian Local Security Checks
medium