The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1144818 | Issue Tracking |
http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04707.html | Patch Vendor Advisory |
http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.html | Patch Vendor Advisory |
http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04598.html | Patch Vendor Advisory |
http://www.debian.org/security/2014/dsa-3045 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-2409-1 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0349.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-0624.html | Third Party Advisory |
http://www.debian.org/security/2014/dsa-3044 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2014-11-07 11:55
Updated : 2023-02-12 16:41
NVD link : CVE-2014-3640
Mitre link : CVE-2014-3640
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
- enterprise_linux_server
canonical
- ubuntu_linux
qemu
- qemu
debian
- debian_linux