CVE-2013-4544Improper Input Validation in Qemu

Severity
4.9MEDIUMNVD
EPSS
0.1%
top 70.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 8
Latest updateMay 17

Description

hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.

CVSS vector

AV:A/AC:M/C:P/I:P/A:PExploitability: 4.4 | Impact: 6.4

Affected Packages4 packages

debiandebian/qemu< qemu 2.0.0+dfsg-1 (bookworm)
Debianqemu/qemu< 2.0.0+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0~rc1+dfsg-0ubuntu3.1
NVDqemu/qemu1.7.1+13

Also affects: Ubuntu Linux 10.04, 12.04, 12.10, 13.10, 14.04

🔴Vulnerability Details

3
GHSA
GHSA-xxjj-3mqq-qmc5: hw/net/vmxnet32022-05-17
OSV
CVE-2013-4544: hw/net/vmxnet32014-05-08
OSV
qemu, qemu-kvm vulnerabilities2014-04-28

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-04-28
Red Hat
Qemu: vmxnet3: bounds checking buffer overrun2014-04-04
Debian
CVE-2013-4544: qemu - hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users ...2013

💬Community

2
Bugzilla
CVE-2013-4544 Qemu: vmxnet3: bounds checking buffer overrun2014-04-14
Bugzilla
CVE-2013-4544 Qemu: vmxnet3: bounds checking buffer overrun [fedora-all]2014-04-14