hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-3461 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does affect the versions of kvm package as shipped with
Red Hat Enterprise Linux 5.
This issue does affect the versions of qemu-kvm package as shipped with
Red Hat Enterprise Linux 6 and 7.
Base Score | 3.7 |
---|---|
Base Metrics | AV:L/AC:H/Au:N/C:P/I:P/A:P |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux OpenStack Platform 4.0 (qemu-kvm-rhev) | RHSA-2014:0888 | 2014-07-24 |
Red Hat Enterprise Linux 7 (qemu-kvm) | RHSA-2014:0927 | 2014-07-23 |
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7 (qemu-kvm-rhev) | RHSA-2014:1268 | 2014-09-22 |
Red Hat Enterprise Linux OpenStack Platform 3.0 (qemu-kvm-rhev) | RHSA-2014:0888 | 2014-07-24 |
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) | RHSA-2014:0674 | 2014-06-09 |
RHEV Agents (vdsm) (qemu-kvm-rhev) | RHSA-2014:0744 | 2014-06-10 |
Red Hat Enterprise Linux 6 (qemu-kvm) | RHSA-2014:0743 | 2014-06-10 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | kvm | Fix deferred |