First published: Fri Oct 04 2013(Updated: )
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=1.6.2 | |
openSUSE | =12.3 | |
openSUSE | =13.1 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux | =6.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4344 has a severity rating of medium due to its potential for local privilege escalation.
To fix CVE-2013-4344, you should update your QEMU software to a version higher than 1.6.2.
CVE-2013-4344 affects QEMU versions up to 1.6.2 and specific releases of openSUSE, Red Hat Enterprise Linux, and Ubuntu.
CVE-2013-4344 is a local privilege escalation vulnerability and cannot be exploited remotely.
CVE-2013-4344 can allow local users to gain elevated privileges on the affected systems.