CVE-2014-0182Improper Restriction of Operations within the Bounds of a Memory Buffer in Qemu

Severity
7.5HIGHNVD
EPSS
3.5%
top 12.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 4
Latest updateMay 13

Description

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages4 packages

debiandebian/qemu< qemu 2.1+dfsg-1 (bookworm)
Debianqemu/qemu< 2.1+dfsg-1+3
Ubuntuqemu/qemu< 2.0.0+dfsg-2ubuntu1.3
NVDqemu/qemu1.7.1+66

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rrm8-gvcw-j2q4: Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio2022-05-13
OSV
CVE-2014-0182: Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio2014-11-04
OSV
qemu, qemu-kvm vulnerabilities2014-09-08

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
qemu: virtio: out-of-bounds buffer write on state load with invalid config_len2014-04-17
Debian
CVE-2014-0182: qemu - Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in ...2014

💬Community

2
Bugzilla
CVE-2014-0182 qemu: virtio: out-of-bounds buffer write on state load with invalid config_len [fedora-all]2014-05-08
Bugzilla
CVE-2014-0182 qemu: virtio: out-of-bounds buffer write on state load with invalid config_len2014-04-17