7.5
CVSSv2

CVE-2014-0222

Published: 04/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the qcow_open function in block/qcow.c in QEMU prior to 1.7.2 allows remote malicious users to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.

Vulnerable Product Search on Vulmon Subscribe to Product

suse linux enterprise server 11.0

qemu qemu 1.0

qemu qemu 0.12.2

qemu qemu 0.12.0

qemu qemu

qemu qemu 1.1

qemu qemu 1.6.0

qemu qemu 0.1.6

qemu qemu 1.5.0

qemu qemu 0.13.0

qemu qemu 0.5.3

qemu qemu 0.4.2

qemu qemu 0.10.3

qemu qemu 1.5.3

qemu qemu 0.15.2

qemu qemu 0.11.0-rc1

qemu qemu 0.1.5

qemu qemu 1.5.1

qemu qemu 0.5.1

qemu qemu 0.8.2

qemu qemu 0.11.0

qemu qemu 0.5.5

qemu qemu 0.10.1

qemu qemu 0.9.0

qemu qemu 0.7.2

qemu qemu 0.12.5

qemu qemu 0.1.3

qemu qemu 0.14.0

qemu qemu 0.11.1

qemu qemu 1.5.2

qemu qemu 0.7.1

qemu qemu 0.9.1-5

qemu qemu 1.0.1

qemu qemu 0.15.0

qemu qemu 0.5.0

qemu qemu 0.14.1

qemu qemu 0.8.1

qemu qemu 0.11.0-rc2

qemu qemu 0.10.0

qemu qemu 0.15.1

qemu qemu 0.4.1

qemu qemu 1.4.1

qemu qemu 0.5.2

qemu qemu 0.12.3

qemu qemu 0.1.1

qemu qemu 1.4.2

qemu qemu 0.7.0

qemu qemu 0.1.4

qemu qemu 0.9.1

qemu qemu 0.6.0

qemu qemu 0.6.1

qemu qemu 1.6.2

qemu qemu 0.10.6

qemu qemu 1.6.1

qemu qemu 0.11.0-rc0

qemu qemu 0.4.3

qemu qemu 0.1.2

qemu qemu 0.5.4

qemu qemu 0.12.4

qemu qemu 0.10.5

qemu qemu 0.10.4

qemu qemu 0.10.2

qemu qemu 0.12.1

qemu qemu 0.8.0

qemu qemu 0.1.0

qemu qemu 0.2.0

qemu qemu 0.3.0

qemu qemu 0.4.0

Vendor Advisories

Several security issues were fixed in QEMU ...
Debian Bug report logs - #742730 image format processing issues: lack of input validation Packages: qemu-kvm, qemu; Maintainer for qemu-kvm is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu-kvm is src:qemu (PTS, buildd, popcon) Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebia ...
Debian Bug report logs - #762532 CVE-2014-3640: qemu: slirp: NULL pointer deref in sosendto() Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Henri Salo <henri@nervfi> Date: Tue, 23 Sep 2014 06:57:12 UTC ...
Several vulnerabilities were discovered in qemu, a fast processor emulator: Various security issues have been found in the block qemu drivers Malformed disk images might result in the execution of arbitrary code A NULL pointer dereference in SLIRP may result in denial of service An information leak was discovered in the VGA emulation For t ...
An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process ...