CVE-2014-0143

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-0143
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2014-0143.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-0143
Related
Published
2017-08-10T15:29:00Z
Modified
2024-09-11T02:00:06Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallelsopen function in block/parallels.c or (2) bochsopen function in bochs.c, a large L1 table in the (3) qcow2snapshotloadtmp in qcow2-snapshot.c or (4) qcow2growl1table function in qcow2-cluster.c, (5) a large request in the bdrvcheckbyterequest function in block.c and other block drivers, (6) crafted cluster indexes in the getrefcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.

References

Affected packages

Debian:11 / qemu

Package

Name
qemu
Purl
pkg:deb/debian/qemu?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / qemu

Package

Name
qemu
Purl
pkg:deb/debian/qemu?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / qemu

Package

Name
qemu
Purl
pkg:deb/debian/qemu?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}