First published: Tue Nov 04 2014(Updated: )
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3461 is classified as having a high severity due to its potential for remote code execution via a buffer overflow.
To fix CVE-2014-3461, upgrade QEMU to version 1.6.3 or later, which addresses the buffer overflow vulnerability.
CVE-2014-3461 specifically affects users running QEMU version 1.6.2.
CVE-2014-3461 can be exploited by remote attackers sending crafted savevm data to trigger a heap-based buffer overflow.
CVE-2014-3461 impacts the hw/usb/bus.c component of QEMU.