4.9
CVSSv2

CVE-2014-0150

Published: 18/04/2014 Updated: 02/11/2020
CVSS v2 Base Score: 4.9 | Impact Score: 6.4 | Exploitability Score: 4.4
VMScore: 436
Vector: AV:A/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and previous versions allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 1.6.1

qemu qemu 1.6.0

qemu qemu 1.5.0

qemu qemu 1.1

qemu qemu 0.9.1-5

qemu qemu 0.9.1

qemu qemu 0.7.0

qemu qemu 0.6.1

qemu qemu 0.4.3

qemu qemu 0.4.2

qemu qemu 0.15.0

qemu qemu 0.13.0

qemu qemu 0.12.0

qemu qemu 0.11.1

qemu qemu 0.11.0

qemu qemu 0.10.6

qemu qemu 0.1.6

qemu qemu 0.1.5

qemu qemu 2.0.0

qemu qemu 1.5.3

qemu qemu 1.4.2

qemu qemu 1.4.1

qemu qemu 1.0

qemu qemu 0.8.1

qemu qemu 0.8.0

qemu qemu 0.5.4

qemu qemu 0.5.3

qemu qemu 0.5.2

qemu qemu 0.3.0

qemu qemu 0.2.0

qemu qemu 0.14.0

qemu qemu 0.12.2

qemu qemu 0.12.1

qemu qemu 0.11.0-rc0

qemu qemu 0.10.3

qemu qemu 0.10.2

qemu qemu 0.1.1

qemu qemu 0.1.0

qemu qemu 1.6.2

qemu qemu

qemu qemu 1.5.2

qemu qemu 1.5.1

qemu qemu 0.7.2

qemu qemu 0.7.1

qemu qemu 0.5.1

qemu qemu 0.5.0

qemu qemu 0.15.2

qemu qemu 0.15.1

qemu qemu 0.10.1

qemu qemu 0.10.0

qemu qemu 1.0.1

qemu qemu 0.9.0

qemu qemu 0.8.2

qemu qemu 0.6.0

qemu qemu 0.5.5

qemu qemu 0.4.1

qemu qemu 0.4.0

qemu qemu 0.14.1

qemu qemu 0.12.5

qemu qemu 0.12.4

qemu qemu 0.12.3

qemu qemu 0.11.0-rc2

qemu qemu 0.11.0-rc1

qemu qemu 0.10.5

qemu qemu 0.10.4

qemu qemu 0.1.4

qemu qemu 0.1.3

qemu qemu 0.1.2

qemu qemu 1.7.1

redhat enterprise linux 6.0

Vendor Advisories

Several security issues were fixed in QEMU ...
Debian Bug report logs - #744221 CVE-2014-0150: guest-triggerable buffer overrun in virtio-net Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Michael Tokarev <mjt@tlsmskru> Date: Fri, 11 Apr 2014 14:30:01 UTC Severity: grave Tags: jessie, patch, ...
Michael S Tsirkin of Red Hat discovered a buffer overflow flaw in the way qemu processed MAC addresses table update requests from the guest A privileged guest user could use this flaw to corrupt qemu process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the qemu process For the ...
Michael S Tsirkin of Red Hat discovered a buffer overflow flaw in the way qemu processed MAC addresses table update requests from the guest A privileged guest user could use this flaw to corrupt qemu process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the qemu process For the ...
Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-netc in QEMU 20 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow ...