Severity
4.6MEDIUMNVD
EPSS
0.1%
top 73.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateMay 24

Description

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

CVSS vector

AV:L/AC:L/C:P/I:P/A:PExploitability: 3.9 | Impact: 6.4

Affected Packages3 packages

Debianqemu/qemu< 2.0.0+dfsg-6+3
NVDqemu/qemu1.7.1+66

Patches

🔴Vulnerability Details

4
GHSA
Withdrawn Advisory: Improper Certificate Validation in Apache Qpid Proton2022-05-24
GHSA
GHSA-234q-mv7h-px9x: Integer overflow in the qcow_open function in block/qcow2022-05-13
CVEList
CVE-2014-0223: Integer overflow in the qcow_open function in block/qcow2014-11-04
OSV
CVE-2014-0223: Integer overflow in the qcow_open function in block/qcow2014-11-04

📋Vendor Advisories

4
Red Hat
qpid-proton: TLS Man in the Middle Vulnerability2019-04-23
Ubuntu
QEMU vulnerabilities2014-09-08
Red Hat
Qemu: qcow1: validate image size to avoid out-of-bounds memory access2014-05-12
Debian
CVE-2014-0223: qemu - Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 ...2014

🕵️Threat Intelligence

2
Talos
Vulnerability Spotlight - LibBPG Image Decoding Code Execution2017-01-23
Talos
Vulnerability Spotlight - LibBPG Image Decoding Code Execution2017-01-23

💬Community

2
Bugzilla
CVE-2014-0223 Qemu: qcow1: validate image size to avoid out-of-bounds memory access [fedora-all]2014-05-13
Bugzilla
CVE-2014-0223 Qemu: qcow1: validate image size to avoid out-of-bounds memory access2014-05-13
CVE-2014-0223 — Integer Overflow or Wraparound in Qemu | cvebase