Out-of-Bounds Affecting qemu-project/qemu package, versions [,1.7.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
6.48% (94th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-QEMUPROJECTQEMU-3007064
  • published26 Jan 2022
  • disclosed4 Nov 2014
  • creditUnknown

Introduced: 4 Nov 2014

CVE-2013-4538  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade qemu-project/qemu to version 1.7.2 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.

CVSS Scores

version 3.1