CVE-2013-4532Improper Restriction of Operations within the Bounds of a Memory Buffer in Qemu

Severity
7.8HIGHNVD
OSV7.5
EPSS
0.2%
top 61.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 2
Latest updateMay 5

Description

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/qemu< qemu 2.1+dfsg-1 (bookworm)
Debianqemu/qemu< 2.1+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.3
NVDqemu/qemu1.1.2\+dfsg2.1\+dfsg
CVEListV5qemu/qemu1.1.2+dfsg to 2.1+dfsg

Also affects: Debian Linux 10.0, 8.0, 9.0, Ubuntu Linux 10.04, 12.04, 14.04

Patches

🔴Vulnerability Details

3
GHSA
GHSA-6fpp-r2v5-x6rq: Qemu 12022-05-05
OSV
CVE-2013-4532: Qemu 12020-01-02
OSV
qemu, qemu-kvm vulnerabilities2014-09-08

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
qemu: stellaris_enet: buffer overrun on incoming migration2013-12-03
Debian
CVE-2013-4532: qemu - Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentiall...2013

💬Community

1
Bugzilla
CVE-2013-4532 qemu: stellaris_enet: buffer overrun on incoming migration2014-02-18