First published: Sun Sep 21 2014(Updated: )
The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
QEMU KVM | =2.0.0 | |
QEMU KVM | =2.0.0-rc0 | |
QEMU KVM | =2.0.0-rc1 | |
QEMU KVM | =2.0.0-rc2 | |
QEMU KVM | =2.0.0-rc3 | |
QEMU KVM | =2.0.2 | |
QEMU KVM | =2.1.0 | |
QEMU KVM | =2.1.0-rc0 | |
QEMU KVM | =2.1.0-rc1 | |
QEMU KVM | =2.1.0-rc2 | |
QEMU KVM | =2.1.0-rc3 | |
QEMU KVM | =2.1.0-rc5 | |
QEMU KVM | =2.1.1 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3640 is classified as a denial of service vulnerability due to a NULL pointer dereference.
To mitigate CVE-2014-3640, you should upgrade QEMU to version 2.1.2 or later.
CVE-2014-3640 affects QEMU versions prior to 2.1.2 as well as certain versions of Debian and Red Hat Enterprise Linux.
CVE-2014-3640 is a denial of service vulnerability that can be exploited by sending specially crafted UDP packets.
CVE-2014-3640 is primarily a local exploit, as it requires local user access to send crafted UDP packets.