Lucene search

K
cve[email protected]CVE-2014-0223
HistoryNov 04, 2014 - 9:55 p.m.

CVE-2014-0223

2014-11-0421:55:25
CWE-189
web.nvd.nist.gov
52
cve-2014-0223
qemu
integer overflow
buffer overflow
denial of service
nvd

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

Affected configurations

NVD
Node
suselinux_enterprise_serverMatch11.0sp1
Node
qemuqemuRange1.7.1
OR
qemuqemuMatch0.1.0
OR
qemuqemuMatch0.1.1
OR
qemuqemuMatch0.1.2
OR
qemuqemuMatch0.1.3
OR
qemuqemuMatch0.1.4
OR
qemuqemuMatch0.1.5
OR
qemuqemuMatch0.1.6
OR
qemuqemuMatch0.2.0
OR
qemuqemuMatch0.3.0
OR
qemuqemuMatch0.4.0
OR
qemuqemuMatch0.4.1
OR
qemuqemuMatch0.4.2
OR
qemuqemuMatch0.4.3
OR
qemuqemuMatch0.5.0
OR
qemuqemuMatch0.5.1
OR
qemuqemuMatch0.5.2
OR
qemuqemuMatch0.5.3
OR
qemuqemuMatch0.5.4
OR
qemuqemuMatch0.5.5
OR
qemuqemuMatch0.6.0
OR
qemuqemuMatch0.6.1
OR
qemuqemuMatch0.7.0
OR
qemuqemuMatch0.7.1
OR
qemuqemuMatch0.7.2
OR
qemuqemuMatch0.8.0
OR
qemuqemuMatch0.8.1
OR
qemuqemuMatch0.8.2
OR
qemuqemuMatch0.9.0
OR
qemuqemuMatch0.9.1
OR
qemuqemuMatch0.9.1-5
OR
qemuqemuMatch0.10.0
OR
qemuqemuMatch0.10.1
OR
qemuqemuMatch0.10.2
OR
qemuqemuMatch0.10.3
OR
qemuqemuMatch0.10.4
OR
qemuqemuMatch0.10.5
OR
qemuqemuMatch0.10.6
OR
qemuqemuMatch0.11.0
OR
qemuqemuMatch0.11.0rc0
OR
qemuqemuMatch0.11.0rc1
OR
qemuqemuMatch0.11.0rc2
OR
qemuqemuMatch0.11.0-rc0
OR
qemuqemuMatch0.11.0-rc1
OR
qemuqemuMatch0.11.0-rc2
OR
qemuqemuMatch0.11.1
OR
qemuqemuMatch0.12.0
OR
qemuqemuMatch0.12.0rc1
OR
qemuqemuMatch0.12.0rc2
OR
qemuqemuMatch0.12.1
OR
qemuqemuMatch0.12.2
OR
qemuqemuMatch0.12.3
OR
qemuqemuMatch0.12.4
OR
qemuqemuMatch0.12.5
OR
qemuqemuMatch0.13.0
OR
qemuqemuMatch0.13.0rc0
OR
qemuqemuMatch0.13.0rc1
OR
qemuqemuMatch0.14.0
OR
qemuqemuMatch0.14.0rc0
OR
qemuqemuMatch0.14.0rc1
OR
qemuqemuMatch0.14.0rc2
OR
qemuqemuMatch0.14.1
OR
qemuqemuMatch0.15.0rc1
OR
qemuqemuMatch0.15.0rc2
OR
qemuqemuMatch0.15.1
OR
qemuqemuMatch0.15.2
OR
qemuqemuMatch1.0
OR
qemuqemuMatch1.0rc1
OR
qemuqemuMatch1.0rc2
OR
qemuqemuMatch1.0rc3
OR
qemuqemuMatch1.0rc4
OR
qemuqemuMatch1.0.1
OR
qemuqemuMatch1.1
OR
qemuqemuMatch1.1rc1
OR
qemuqemuMatch1.1rc2
OR
qemuqemuMatch1.1rc3
OR
qemuqemuMatch1.1rc4
OR
qemuqemuMatch1.4.1
OR
qemuqemuMatch1.4.2
OR
qemuqemuMatch1.5.0
OR
qemuqemuMatch1.5.0rc1
OR
qemuqemuMatch1.5.0rc2
OR
qemuqemuMatch1.5.0rc3
OR
qemuqemuMatch1.5.1
OR
qemuqemuMatch1.5.2
OR
qemuqemuMatch1.5.3
OR
qemuqemuMatch1.6.0
OR
qemuqemuMatch1.6.0rc1
OR
qemuqemuMatch1.6.0rc2
OR
qemuqemuMatch1.6.0rc3
OR
qemuqemuMatch1.6.1
OR
qemuqemuMatch1.6.2

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%