| Vulnerability Name: | CVE-2013-4532 (CCN-150815) | ||||||||||||||||
| Assigned: | 2013-06-12 | ||||||||||||||||
| Published: | 2014-09-22 | ||||||||||||||||
| Updated: | 2020-01-15 | ||||||||||||||||
| Summary: | Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. | ||||||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||||||
| CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P) 3.4 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
2.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2013-4532 Source: MISC Type: Third Party Advisory http://www.ubuntu.com/usn/USN-2342-1 Source: MISC Type: Third Party Advisory https://access.redhat.com/security/cve/cve-2013-4532 Source: MISC Type: Mailing List, Third Party Advisory https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589 Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4532 Source: XF Type: UNKNOWN qemu-cve20134532-bo(150815) Source: MISC Type: Patch, Third Party Advisory https://github.com/qemu/qemu/commit/2e1198672759eda6e122ff38fcf6df06f27e0fe2 Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2013-4532 Source: CCN Type: QEMU Web site the FAST! processor emulator | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||