CVE-2014-3461

Related Vulnerabilities: CVE-2014-3461  

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

The MITRE CVE dictionary describes this issue as:

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

Find out more about CVE-2014-3461 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does affect the versions of kvm package as shipped with
Red Hat Enterprise Linux 5.

This issue does affect the versions of qemu-kvm package as shipped with
Red Hat Enterprise Linux 6 and 7.

CVSS v2 metrics

Base Score 3.7
Base Metrics AV:L/AC:H/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux OpenStack Platform 4.0 (qemu-kvm-rhev) RHSA-2014:0888 2014-07-24
Red Hat Enterprise Linux 7 (qemu-kvm) RHSA-2014:0927 2014-07-23
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (qemu-kvm-rhev) RHSA-2014:1268 2014-09-22
Red Hat Enterprise Linux OpenStack Platform 3.0 (qemu-kvm-rhev) RHSA-2014:0888 2014-07-24
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2014:0674 2014-06-09
RHEV Agents (vdsm) (qemu-kvm-rhev) RHSA-2014:0744 2014-06-10
Red Hat Enterprise Linux 6 (qemu-kvm) RHSA-2014:0743 2014-06-10

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 kvm Fix deferred

Acknowledgements

This issue was discovered as part of the state loading QEMU audit performed by Michael S. Tsirkin of Red Hat, Anthony Liguori, and Michael Roth.