[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-4532Date: (C)2020-01-03   (M)2023-12-22


Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.8CVSS Score : 4.6
Exploit Score: 1.8Exploit Score: 3.9
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
http://www.ubuntu.com/usn/USN-2342-1
https://access.redhat.com/security/cve/cve-2013-4532
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4532
https://github.com/qemu/qemu/commit/2e1198672759eda6e122ff38fcf6df06f27e0fe2
https://security-tracker.debian.org/tracker/CVE-2013-4532

CPE    6
cpe:/o:debian:debian_linux:9.0
cpe:/a:qemu:qemu
cpe:/o:canonical:ubuntu_linux:10.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
...
CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:702202
oval:org.secpod.oval:def:52293

© SecPod Technologies