CVE-2014-2894

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.

References

http://rhn.redhat.com/errata/RHSA-2014-0704.html

http://rhn.redhat.com/errata/RHSA-2014-0743.html

http://rhn.redhat.com/errata/RHSA-2014-0744.html

http://secunia.com/advisories/57945

http://secunia.com/advisories/58191

http://www.openwall.com/lists/oss-security/2014/04/15/4

http://www.openwall.com/lists/oss-security/2014/04/18/5

http://www.securityfocus.com/bid/66932

http://www.ubuntu.com/usn/USN-2182-1

https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html

https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02095.html

https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02152.html

Details

Source: MITRE

Published: 2014-04-23

Updated: 2020-11-02

Type: CWE-189

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.3.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.3.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.3.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.0:rc0:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* versions up to 1.7.1 (inclusive)

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
79030RHEL 6 : qemu-kvm-rhev (RHSA-2014:0744)NessusRed Hat Local Security Checks
high
79029RHEL 6 : rhev-hypervisor6 3.4.0 (RHSA-2014:0674)NessusRed Hat Local Security Checks
high
77461GLSA-201408-17 : QEMU: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
76899RHEL 7 : qemu-kvm (RHSA-2014:0704)NessusRed Hat Local Security Checks
high
76737Oracle Linux 7 : qemu-kvm (ELSA-2014-0704)NessusOracle Linux Local Security Checks
high
76138SuSE 11.3 Security Update : KVM (SAT Patch Number 9302)NessusSuSE Local Security Checks
high
74490Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20140610)NessusScientific Linux Local Security Checks
high
74474CentOS 6 : qemu-kvm (CESA-2014:0743)NessusCentOS Local Security Checks
high
74461RHEL 6 : qemu-kvm (RHSA-2014:0743)NessusRed Hat Local Security Checks
high
74457Oracle Linux 6 : qemu-kvm (ELSA-2014-0743)NessusOracle Linux Local Security Checks
high
74096Debian DSA-2933-1 : qemu-kvm - security updateNessusDebian Local Security Checks
high
74095Debian DSA-2932-1 : qemu - security updateNessusDebian Local Security Checks
high
73818Fedora 20 : qemu-1.6.2-4.fc20 (2014-5825)NessusFedora Local Security Checks
high
73752Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 / 14.04 LTS : qemu, qemu-kvm vulnerabilities (USN-2182-1)NessusUbuntu Local Security Checks
high