7.5
CVSSv2

CVE-2014-7840

Published: 12/12/2014 Updated: 13/02/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote malicious users to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux eus 7.3

redhat enterprise linux eus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux server aus 7.6

redhat enterprise linux eus 7.6

redhat enterprise linux server aus 7.7

redhat enterprise linux eus 7.7

redhat virtualization 3.0

Vendor Advisories

Debian Bug report logs - #769451 qemu: CVE-2014-7840: insufficient parameter validation during ram load Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 13 Nov 2014 17:42:01 UTC Severity: important ...
Several security issues were fixed in QEMU ...
It was found that certain values that were read when loading RAM during migration were not validated A user able to alter the savevm data (either on the disk or over the wire during migration) could use either of these flaws to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the ...