CVE-2014-0223

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

References

http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html

http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html

http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html

http://www.debian.org/security/2014/dsa-3044

http://www.securityfocus.com/bid/67391

https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02156.html

Details

Source: MITRE

Published: 2014-11-04

Updated: 2020-11-02

Type: CWE-189

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:suse:linux_enterprise_server:11.0:sp1:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 1.7.1 (inclusive)

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
83854SUSE SLES11 Security Update : KVM (SUSE-SU-2015:0929-1) (Venom)NessusSuSE Local Security Checks
high
81944Mandriva Linux Security Advisory : qemu (MDVSA-2015:061)NessusMandriva Local Security Checks
high
79407Mandriva Linux Security Advisory : qemu (MDVSA-2014:220)NessusMandriva Local Security Checks
high
79048RHEL 6 : rhev-hypervisor6 (RHSA-2014:1168)NessusRed Hat Local Security Checks
high
79041RHEL 6 : qemu-kvm-rhev (RHSA-2014:1076)NessusRed Hat Local Security Checks
high
78105SuSE 11.3 Security Update : kvm (SAT Patch Number 9739)NessusSuSE Local Security Checks
high
78046Debian DSA-3045-1 : qemu - security updateNessusDebian Local Security Checks
high
78045Debian DSA-3044-1 : qemu-kvm - security updateNessusDebian Local Security Checks
high
77570Ubuntu 10.04 LTS / 12.04 LTS / 14.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2342-1)NessusUbuntu Local Security Checks
high
77461GLSA-201408-17 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
77286CentOS 6 : qemu-kvm (CESA-2014:1075)NessusCentOS Local Security Checks
high
77272Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20140819)NessusScientific Linux Local Security Checks
high
77271RHEL 6 : qemu-kvm (RHSA-2014:1075)NessusRed Hat Local Security Checks
high
77270Oracle Linux 6 : qemu-kvm (ELSA-2014-1075)NessusOracle Linux Local Security Checks
high
76907RHEL 7 : qemu-kvm (RHSA-2014:0927)NessusRed Hat Local Security Checks
high
76839CentOS 7 : qemu-kvm (CESA-2014:0927)NessusCentOS Local Security Checks
high
76748Oracle Linux 7 : qemu-kvm (ELSA-2014-0927)NessusOracle Linux Local Security Checks
high
74414Fedora 20 : qemu-1.6.2-6.fc20 (2014-6970)NessusFedora Local Security Checks
high