CVE-2014-0144
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
29/09/2022
Last modified:
13/02/2023
Description
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:* | 2.0.0 (excluding) | |
cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_openstack_platform:5:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D24342f2cae47d03911e346fe1e520b00dc2818e0
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D2d51c32c4b511db8bb9e58208f1e2c25e4c06c85
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D5dab2faddc8eaa1fb1abdbe2f502001fc13a1b21
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D63fa06dc978f3669dbfd9443b33cde9e2a7f4b41
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D6d4b9e55fc625514a38d27cff4b9933f617fa7dc
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D7b103b36d6ef3b11827c203d3a793bf7da50ecd6
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3D97f1c45c6f456572e5b504b8614e4a69e23b8e3a
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Da1b3955c9415b1e767c130a2f59fee6aa28e575b
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Dce48f2f441ca98885267af6fd636a7cb804ee646
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Dd65f97a82c4ed48374a764c769d4ba1ea9724e97
- http://git.qemu.org/?p=qemu.git%3Ba%3Dcommit%3Bh%3Df56b9bc3ae20fc93815b34aa022be919941406ce
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1079240
- https://www.vulnerabilitycenter.com/#%21vul=44767