5
CVSSv2

CVE-2014-7815

Published: 14/11/2014 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The set_pixel_format function in ui/vnc.c in QEMU allows remote malicious users to cause a denial of service (crash) via a small bytes_per_pixel value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

debian debian linux 7.0

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux eus 7.3

redhat enterprise linux eus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux server aus 7.6

redhat enterprise linux eus 7.6

redhat enterprise linux server aus 7.7

redhat enterprise linux eus 7.7

redhat virtualization 3.0

canonical ubuntu linux 14.10

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 10.04

suse linux enterprise server 12

suse linux enterprise desktop 12

Vendor Advisories

Debian Bug report logs - #765496 CVE-2014-3689: insufficient parameter validation in vmware_vga rectangle functions Package: qemu-system-x86; Maintainer for qemu-system-x86 is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu-system-x86 is src:qemu (PTS, buildd, popcon) Reported by: Michael Tokarev & ...
Several security issues were fixed in QEMU ...
Several vulnerabilities were discovered in qemu, a fast processor emulator CVE-2014-3689 The Advanced Threat Research team at Intel Security reported that guest provided parameter were insufficiently validated in rectangle functions in the vmware-vga driver A privileged guest user could use this flaw to write into qemu address sp ...
Several vulnerabilities were discovered in qemu-kvm, a full virtualization solution on x86 hardware CVE-2014-3689 The Advanced Threat Research team at Intel Security reported that guest provided parameter were insufficiently validated in rectangle functions in the vmware-vga driver A privileged guest user could use this flaw to w ...
An uninitialized data structure use flaw was found in the way the set_pixel_format() function sanitized the value of bits_per_pixel An attacker able to access a guest's VNC console could use this flaw to crash the guest ...