7.5
CVSSv2

CVE-2013-4150

Published: 04/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 up to and including 1.7.x prior to 1.7.2 allows remote malicious users to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 1.6.0

qemu qemu 1.5.0

qemu qemu 1.5.3

qemu qemu 1.5.1

qemu qemu 1.5.2

qemu qemu 1.7.1

qemu qemu 1.6.2

qemu qemu 1.6.1

Vendor Advisories

Debian Bug report logs - #739589 multiple security flaws in migration stream processing Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 20 Feb 2014 08:36:01 UT ...
Several security issues were fixed in QEMU ...
The virtio_net_load function in hw/net/virtio-netc in QEMU 150 through 17x before 172 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write ...