Lucene search

K
cve[email protected]CVE-2013-4538
HistoryNov 04, 2014 - 9:55 p.m.

CVE-2013-4538

2014-11-0421:55:24
CWE-119
web.nvd.nist.gov
44
cve-2013-4538
buffer overflow
qemu
denial of service
memory corruption
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.2 High

AI Score

Confidence

High

0.065 Low

EPSS

Percentile

93.8%

Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.

Affected configurations

NVD
Node
qemuqemuRange1.7.1
OR
qemuqemuMatch0.1.0
OR
qemuqemuMatch0.1.1
OR
qemuqemuMatch0.1.2
OR
qemuqemuMatch0.1.3
OR
qemuqemuMatch0.1.4
OR
qemuqemuMatch0.1.5
OR
qemuqemuMatch0.1.6
OR
qemuqemuMatch0.2.0
OR
qemuqemuMatch0.3.0
OR
qemuqemuMatch0.4.0
OR
qemuqemuMatch0.4.1
OR
qemuqemuMatch0.4.2
OR
qemuqemuMatch0.4.3
OR
qemuqemuMatch0.5.0
OR
qemuqemuMatch0.5.1
OR
qemuqemuMatch0.5.2
OR
qemuqemuMatch0.5.3
OR
qemuqemuMatch0.5.4
OR
qemuqemuMatch0.5.5
OR
qemuqemuMatch0.6.0
OR
qemuqemuMatch0.6.1
OR
qemuqemuMatch0.7.0
OR
qemuqemuMatch0.7.1
OR
qemuqemuMatch0.7.2
OR
qemuqemuMatch0.8.0
OR
qemuqemuMatch0.8.1
OR
qemuqemuMatch0.8.2
OR
qemuqemuMatch0.9.0
OR
qemuqemuMatch0.9.1
OR
qemuqemuMatch0.9.1-5
OR
qemuqemuMatch0.10.0
OR
qemuqemuMatch0.10.1
OR
qemuqemuMatch0.10.2
OR
qemuqemuMatch0.10.3
OR
qemuqemuMatch0.10.4
OR
qemuqemuMatch0.10.5
OR
qemuqemuMatch0.10.6
OR
qemuqemuMatch0.11.0
OR
qemuqemuMatch0.11.0rc0
OR
qemuqemuMatch0.11.0rc1
OR
qemuqemuMatch0.11.0rc2
OR
qemuqemuMatch0.11.0-rc0
OR
qemuqemuMatch0.11.0-rc1
OR
qemuqemuMatch0.11.0-rc2
OR
qemuqemuMatch0.11.1
OR
qemuqemuMatch0.12.0
OR
qemuqemuMatch0.12.0rc1
OR
qemuqemuMatch0.12.0rc2
OR
qemuqemuMatch0.12.1
OR
qemuqemuMatch0.12.2
OR
qemuqemuMatch0.12.3
OR
qemuqemuMatch0.12.4
OR
qemuqemuMatch0.12.5
OR
qemuqemuMatch0.13.0
OR
qemuqemuMatch0.13.0rc0
OR
qemuqemuMatch0.13.0rc1
OR
qemuqemuMatch0.14.0
OR
qemuqemuMatch0.14.0rc0
OR
qemuqemuMatch0.14.0rc1
OR
qemuqemuMatch0.14.0rc2
OR
qemuqemuMatch0.14.1
OR
qemuqemuMatch0.15.0rc1
OR
qemuqemuMatch0.15.0rc2
OR
qemuqemuMatch0.15.1
OR
qemuqemuMatch0.15.2
OR
qemuqemuMatch1.0
OR
qemuqemuMatch1.0rc1
OR
qemuqemuMatch1.0rc2
OR
qemuqemuMatch1.0rc3
OR
qemuqemuMatch1.0rc4
OR
qemuqemuMatch1.0.1
OR
qemuqemuMatch1.1
OR
qemuqemuMatch1.1rc1
OR
qemuqemuMatch1.1rc2
OR
qemuqemuMatch1.1rc3
OR
qemuqemuMatch1.1rc4
OR
qemuqemuMatch1.4.1
OR
qemuqemuMatch1.4.2
OR
qemuqemuMatch1.5.0
OR
qemuqemuMatch1.5.0rc1
OR
qemuqemuMatch1.5.0rc2
OR
qemuqemuMatch1.5.0rc3
OR
qemuqemuMatch1.5.1
OR
qemuqemuMatch1.5.2
OR
qemuqemuMatch1.5.3
OR
qemuqemuMatch1.6.0
OR
qemuqemuMatch1.6.0rc1
OR
qemuqemuMatch1.6.0rc2
OR
qemuqemuMatch1.6.0rc3
OR
qemuqemuMatch1.6.1
OR
qemuqemuMatch1.6.2

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.2 High

AI Score

Confidence

High

0.065 Low

EPSS

Percentile

93.8%