7.2
CVSSv2

CVE-2014-3689

Published: 14/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

debian debian linux 7.0

canonical ubuntu linux 14.10

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 10.04

Vendor Advisories

Debian Bug report logs - #765496 CVE-2014-3689: insufficient parameter validation in vmware_vga rectangle functions Package: qemu-system-x86; Maintainer for qemu-system-x86 is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu-system-x86 is src:qemu (PTS, buildd, popcon) Reported by: Michael Tokarev & ...
Several security issues were fixed in QEMU ...
Several vulnerabilities were discovered in qemu, a fast processor emulator CVE-2014-3689 The Advanced Threat Research team at Intel Security reported that guest provided parameter were insufficiently validated in rectangle functions in the vmware-vga driver A privileged guest user could use this flaw to write into qemu address sp ...
Several vulnerabilities were discovered in qemu-kvm, a full virtualization solution on x86 hardware CVE-2014-3689 The Advanced Threat Research team at Intel Security reported that guest provided parameter were insufficiently validated in rectangle functions in the vmware-vga driver A privileged guest user could use this flaw to w ...
The vmware-vga driver (hw/display/vmware_vgac) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling ...