First published: Fri Nov 14 2014(Updated: )
The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <=2.1.3 | |
Debian GNU/Linux | =7.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3689 is classified as moderate due to its potential to allow local guest users to gain privileges.
To fix CVE-2014-3689, upgrade QEMU to version 2.1.4 or newer.
CVE-2014-3689 affects various versions of QEMU, Debian 7.0, and several versions of Ubuntu Linux including 10.04, 12.04, 14.04, and 14.10.
The potential risks of CVE-2014-3689 include unauthorized privilege escalation and unauthorized access to sensitive information within the virtual machine.
A possible workaround for CVE-2014-3689 is to restrict local guest user access to the QEMU environment until the system can be upgraded.