Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2013/10/02/2 | Mailing List Third Party Advisory |
http://osvdb.org/98028 | Broken Link |
http://www.securityfocus.com/bid/62773 | Third Party Advisory VDB Entry |
http://article.gmane.org/gmane.comp.emulators.qemu/237191 | Broken Link |
http://rhn.redhat.com/errata/RHSA-2013-1754.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-1553.html | Third Party Advisory |
http://www.ubuntu.com/usn/USN-2092-1 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
Information
Published : 2013-10-04 10:55
Updated : 2020-08-11 08:21
NVD link : CVE-2013-4344
Mitre link : CVE-2013-4344
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux
- enterprise_linux_workstation
- virtualization
- enterprise_linux_server
canonical
- ubuntu_linux
qemu
- qemu
opensuse
- opensuse