First published: Mon Apr 14 2014(Updated: )
An array index bounds overrun flaw has been discovered in the vmxnet3 device as emulated by qemu. A privileged guest user could use this flaw to corrupt qemu process' memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the qemu process. Upstream fix: ------------- -> <a href="http://thread.gmane.org/gmane.comp.emulators.qemu/265562">http://thread.gmane.org/gmane.comp.emulators.qemu/265562</a> Acknowledgements: This issue was discovered by Michael S. Tsirkin of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Ubuntu | =14.04 | |
QEMU | <=1.7.1 | |
QEMU | =1.0 | |
QEMU | =1.0-rc1 | |
QEMU | =1.0-rc2 | |
QEMU | =1.0-rc3 | |
QEMU | =1.0-rc4 | |
QEMU | =1.0.1 | |
QEMU | =1.1 | |
QEMU | =1.1-rc1 | |
QEMU | =1.1-rc2 | |
QEMU | =1.1-rc3 | |
QEMU | =1.1-rc4 | |
QEMU | =1.4.1 | |
QEMU | =1.4.2 | |
QEMU | =1.5.0 | |
QEMU | =1.5.0-rc1 | |
QEMU | =1.5.0-rc2 | |
QEMU | =1.5.0-rc3 | |
QEMU | =1.5.1 | |
QEMU | =1.5.2 | |
QEMU | =1.5.3 | |
QEMU | =1.6.0 | |
QEMU | =1.6.0-rc1 | |
QEMU | =1.6.0-rc2 | |
QEMU | =1.6.0-rc3 | |
QEMU | =1.6.1 | |
QEMU | =1.6.2 | |
QEMU | =2.0.0-rc0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4544 is considered to have high severity due to its potential for arbitrary code execution on the host system.
To fix CVE-2013-4544, users should update QEMU to a version higher than 1.7.1 or apply any relevant security patches provided by their operating system.
CVE-2013-4544 affects various versions of Ubuntu Linux from 10.04 to 14.04 LTS and QEMU KVM versions up to and including 1.7.1.
CVE-2013-4544 could be exploited by a privileged guest user to corrupt the memory of the qemu process on the host, potentially leading to remote code execution.
CVE-2013-4544 can be exploited by any privileged user within a virtual machine that uses the vulnerable vmxnet3 device.