7.5
CVSSv2

CVE-2013-4540

Published: 04/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in scoop_gpio_handler_update in QEMU prior to 1.7.2 might allow remote malicious users to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 1.0

qemu qemu 0.12.2

qemu qemu 0.12.0

qemu qemu

qemu qemu 1.1

qemu qemu 1.6.0

qemu qemu 0.1.6

qemu qemu 1.5.0

qemu qemu 0.13.0

qemu qemu 0.5.3

qemu qemu 0.4.2

qemu qemu 0.10.3

qemu qemu 1.5.3

qemu qemu 0.15.2

qemu qemu 0.11.0-rc1

qemu qemu 0.1.5

qemu qemu 1.5.1

qemu qemu 0.5.1

qemu qemu 0.8.2

qemu qemu 0.11.0

qemu qemu 0.5.5

qemu qemu 0.10.1

qemu qemu 0.9.0

qemu qemu 0.7.2

qemu qemu 0.12.5

qemu qemu 0.1.3

qemu qemu 0.14.0

qemu qemu 0.11.1

qemu qemu 1.5.2

qemu qemu 0.7.1

qemu qemu 0.9.1-5

qemu qemu 1.0.1

qemu qemu 0.15.0

qemu qemu 0.5.0

qemu qemu 0.14.1

qemu qemu 0.8.1

qemu qemu 0.11.0-rc2

qemu qemu 0.10.0

qemu qemu 0.15.1

qemu qemu 0.4.1

qemu qemu 1.4.1

qemu qemu 0.5.2

qemu qemu 0.12.3

qemu qemu 0.1.1

qemu qemu 1.4.2

qemu qemu 0.7.0

qemu qemu 0.1.4

qemu qemu 0.9.1

qemu qemu 0.6.0

qemu qemu 0.6.1

qemu qemu 1.6.2

qemu qemu 0.10.6

qemu qemu 1.6.1

qemu qemu 0.11.0-rc0

qemu qemu 0.4.3

qemu qemu 0.1.2

qemu qemu 0.5.4

qemu qemu 0.12.4

qemu qemu 0.10.5

qemu qemu 0.10.4

qemu qemu 0.10.2

qemu qemu 0.12.1

qemu qemu 0.8.0

qemu qemu 0.1.0

qemu qemu 0.2.0

qemu qemu 0.3.0

qemu qemu 0.4.0

opensuse opensuse 12.3

opensuse opensuse 13.1

Vendor Advisories

Debian Bug report logs - #739589 multiple security flaws in migration stream processing Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 20 Feb 2014 08:36:01 UT ...
Several security issues were fixed in QEMU ...
Buffer overflow in scoop_gpio_handler_update in QEMU before 172 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image ...