6.8
CVSSv2

CVE-2014-3461

Published: 04/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

hw/usb/bus.c in QEMU 1.6.2 allows remote malicious users to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 1.6.2

Vendor Advisories

Debian Bug report logs - #739589 multiple security flaws in migration stream processing Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 20 Feb 2014 08:36:01 UT ...
Several security issues were fixed in QEMU ...
hw/usb/busc in QEMU 162 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks" ...