CVE-2013-4541Improper Restriction of Operations within the Bounds of a Memory Buffer in Qemu

Severity
7.5HIGHNVD
EPSS
1.7%
top 17.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 4
Latest updateMay 13

Description

The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

debiandebian/qemu< qemu 2.1+dfsg-1 (bookworm)
Debianqemu/qemu< 2.1+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.3
NVDqemu/qemu1.7.1+66

Patches

🔴Vulnerability Details

3
GHSA
GHSA-fjg4-4wq7-6hrq: The usb_device_post_load function in hw/usb/bus2022-05-13
OSV
CVE-2013-4541: The usb_device_post_load function in hw/usb/bus2014-11-04
OSV
qemu, qemu-kvm vulnerabilities2014-09-08

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load2013-12-03
Debian
CVE-2013-4541: qemu - The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might all...2013

💬Community

2
Bugzilla
CVE-2013-4541 qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load [fedora-all]2014-05-08
Bugzilla
CVE-2013-4541 qemu: usb: insufficient sanity checking of setup_index+setup_len in post_load2014-02-18