Heap-based buffer overflow in QEMU - CVE-2014-0150
Published: April 18, 2014 / Updated: July 28, 2020
QEMU
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier. A remote attacker can use a MAC addresses table update request to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2014-0150
Sources
- http://article.gmane.org/gmane.comp.emulators.qemu/266768
- http://secunia.com/advisories/57878
- http://secunia.com/advisories/58191
- http://thread.gmane.org/gmane.comp.emulators.qemu/266713
- http://www.debian.org/security/2014/dsa-2909
- http://www.debian.org/security/2014/dsa-2910
- http://www.ubuntu.com/usn/USN-2182-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1078846