Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2014:249 | First vendor Publication | 2014-12-14 |
Vendor | Mandriva | Last vendor Modification | 2014-12-14 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Updated qemu packages fix security vulnerabilities: During migration, the values read from migration stream during ram load are not validated. Especially offset in host_from_stream_offset() and also the length of the writes in the callers of the said function. A user able to alter the savevm data (either on the disk or over the wire during migration) could use either of these flaws to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process (CVE-2014-7840). Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process (CVE-2014-8106). |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2014:249 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:27930 | |||
Oval ID: | oval:org.mitre.oval:def:27930 | ||
Title: | DSA-3087-1 -- qemu security update | ||
Description: | Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu, a fast processor emulator. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3087-1 CVE-2014-8106 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | qemu |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28240 | |||
Oval ID: | oval:org.mitre.oval:def:28240 | ||
Title: | DSA-3088-1 -- qemu-kvm security update | ||
Description: | Paolo Bonzini of Red Hat discovered that the blit region checks were insufficient in the Cirrus VGA emulator in qemu-kvm, a full virtualization solution on x86 hardware. A privileged guest user could use this flaw to write into qemu address space on the host, potentially escalating their privileges to those of the qemu host process. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3088-1 CVE-2014-8106 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | qemu-kvm |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28497 | |||
Oval ID: | oval:org.mitre.oval:def:28497 | ||
Title: | USN-2439-1 -- QEMU vulnerabilities | ||
Description: | Michael S. Tsirkin discovered that QEMU incorrectly handled certain parameters during ram load while performing a migration. An attacker able to manipulate savevm data could use this issue to possibly execute arbitrary code on the host. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, and Ubuntu 14.10. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-7840">CVE-2014-7840</a>) Paolo Bonzini discovered that QEMU incorrectly handled memory in the Cirrus VGA device. A malicious guest could possibly use this issue to write into memory of the host, leading to privilege escalation. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8106">CVE-2014-8106</a>) | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2439-1 CVE-2014-7840 CVE-2014-8106 | Version: | 3 |
Platform(s): | Ubuntu 14.10 Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | qemu qemu-kvm |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-04 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0096.nasl - Type : ACT_GATHER_INFO |
2017-05-04 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0095.nasl - Type : ACT_GATHER_INFO |
2017-03-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0718-1.nasl - Type : ACT_GATHER_INFO |
2017-03-10 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0647-1.nasl - Type : ACT_GATHER_INFO |
2017-03-01 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-0582-1.nasl - Type : ACT_GATHER_INFO |
2016-02-17 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL63519101.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2015-0349-1.nasl - Type : ACT_GATHER_INFO |
2015-04-30 | Name : The remote host is missing a vendor-supplied security patch. File : citrix_xenserver_CTX200892.nasl - Type : ACT_GATHER_INFO |
2015-04-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0868.nasl - Type : ACT_GATHER_INFO |
2015-04-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0867.nasl - Type : ACT_GATHER_INFO |
2015-04-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150421_qemu_kvm_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2015-04-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0867.nasl - Type : ACT_GATHER_INFO |
2015-04-22 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0867.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : The remote Fedora host is missing a security update. File : fedora_2015-5482.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20150305_qemu_kvm_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-061.nasl - Type : ACT_GATHER_INFO |
2015-03-18 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2015-0349.nasl - Type : ACT_GATHER_INFO |
2015-03-13 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2015-0349.nasl - Type : ACT_GATHER_INFO |
2015-03-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0624.nasl - Type : ACT_GATHER_INFO |
2015-03-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-0349.nasl - Type : ACT_GATHER_INFO |
2015-02-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kvm-libvirt-201412-150124.nasl - Type : ACT_GATHER_INFO |
2015-02-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kvm-libvirt-201412-150123.nasl - Type : ACT_GATHER_INFO |
2015-02-18 | Name : The remote Fedora host is missing a security update. File : fedora_2015-1886.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-37.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16626.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2439-1.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-249.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16075.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3087.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3088.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-01-20 21:26:00 |
|
2014-12-16 13:25:50 |
|
2014-12-16 00:27:10 |
|
2014-12-14 21:22:48 |
|