Severity
8.8HIGH
EPSS
0.4%
top 40.51%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 11
Latest updateMay 5

Description

The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 2.0 | Impact: 6.0

Affected Packages8 packages

NVDqemu/qemu< 1.7.2
Debianqemu< 2.1+dfsg-1+3
Ubuntuqemu< 2.0.0+dfsg-2ubuntu1.3
CVEListV5qemubefore 1.7.2

Also affects: Enterprise Linux 6.5

🔴Vulnerability Details

4
GHSA
GHSA-4g6m-vjr9-mv9r: The virtqueue_map_sg function in hw/virtio/virtio2022-05-05
CVEList
CVE-2013-4535: The virtqueue_map_sg function in hw/virtio/virtio2020-02-11
OSV
CVE-2013-4535: The virtqueue_map_sg function in hw/virtio/virtio2020-02-11
OSV
qemu, qemu-kvm vulnerabilities2014-09-08

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
qemu: virtio: insufficient validation of num_sg when mapping2013-12-03
Debian
CVE-2013-4535: qemu - The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows ...2013

💬Community

2
Bugzilla
CVE-2013-4535 CVE-2013-4536 qemu: virtio: insufficient validation of num_sg when mapping [fedora-all]2014-05-08
Bugzilla
CVE-2013-4535 CVE-2013-4536 qemu: virtio: insufficient validation of num_sg when mapping2014-02-18
CVE-2013-4535 (HIGH CVSS 8.8) | The virtqueue_map_sg function in hw | cvebase.io