oss-sec mailing list archives

Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART


From: cve-assign () mitre org
Date: Fri, 18 Apr 2014 02:57:18 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

An out of bounds memory access flaw was found in Qemu's IDE device model. It
leads to Qemu's memory corruption via buffer overwrite(4 bytes). It occurs
while executing IDE SMART commands.

A guest's user could use this flaw to corrupt Qemu process's memory on the
host.

https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html

Use CVE-2014-2894.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTUMuTAAoJEKllVAevmvmsXfsH+wfnzHlKRV9fAWjgGXj1lmCL
jjjS9vPHJgDGstCzDsq0fVDilwye2+1zWmHKJ1J56fWgOhwQJqvLelSL6teLNW44
4He7QyA0FynTTuv1G7sFqlEzF9PpnpwBPbIVmZgWy4pSFehz1BSps3YajStquCA1
4qiDddNKmeu3qMfBin5V+KZjVZLRc8Whg0k3JHhVu4Ua77lx+l4V4VworNQtxPOI
ixxGQeHMi/tWY3fUcPfaA6fOrpYT/f+bmNGpE1IvPtevAeA6xHO1JaXb0ykVKCT+
i0B0OayXm7yGZRDbqGFWlPX2l/EtZXE+5ymSgPf5iaIWcqS2dDdeeaQZ6UBAqNE=
=BERj
-----END PGP SIGNATURE-----


Current thread: