The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4150 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the versions of kvm package as shipped with
Red Hat Enterprise Linux 5.
This issue does not affect the versions of qemu-kvm package as shipped
with Red Hat Enterprise Linux 6.
Base Score | 3.7 |
---|---|
Base Metrics | AV:L/AC:H/Au:N/C:P/I:P/A:P |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (qemu-kvm-rhev) | RHSA-2014:1268 | 2014-09-22 |
Red Hat Enterprise Linux 7 (qemu-kvm) | RHSA-2014:0927 | 2014-07-23 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 6 | qemu-kvm | Not affected |
Red Hat Enterprise Linux 5 | kvm | Not affected |