Vulnerability CVE-2008-4539


Published: 2008-12-29   Modified: 2012-02-12

Description:
Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow. NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

Vendor: Kvm qumranet
Product: KVM 
Version:
81
80
79
78
77
76
75
74
73
72
71
70
7
69
68
67
66
65
64
63
62
61
60
6
59
58
57
56
55
54
53
52
51
50
5
49
48
47
46
45
44
43
42
41
40
4
39
38
37
36
35
34
33
32
31
30
3
29
28
27
26
25
24
23
22
21
20
2
19
18
17
16
15
14
13
12
11
10
1
Vendor: QEMU
Product: QEMU 

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
https://launchpad.net/ubuntu/jaunty/+source/qemu/0.9.1+svn20081112-1ubuntu1
https://bugzilla.redhat.com/show_bug.cgi?id=466890
https://bugzilla.redhat.com/show_bug.cgi?id=448525
https://bugzilla.redhat.com/show_bug.cgi?id=237342
http://xforce.iss.net/xforce/xfdb/47736
http://www.ubuntu.com/usn/usn-776-1
http://www.mail-archive.com/secure-testing-commits@lists.alioth.debian.org/msg09322.html
http://www.mail-archive.com/cvs-all@freebsd.org/msg129730.html
http://www.debian.org/security/2009/dsa-1799
http://svn.savannah.gnu.org/viewvc/?view=rev&root=qemu&revision=5587
http://secunia.com/advisories/35062
http://secunia.com/advisories/35031
http://secunia.com/advisories/34642
http://secunia.com/advisories/33350
http://secunia.com/advisories/29129
http://secunia.com/advisories/25073
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://groups.google.com/group/linux.debian.changes.devel/msg/9e0dc008572f2867?dmode=source
http://git.kernel.dk/?p=qemu.git;a=commitdiff;h=65d35a09979e63541afc5bfc595b9f1b1b4ae069

Related CVE
CVE-2019-9824
tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
CVE-2018-20815
In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference.
CVE-2019-12247
** DISPUTED ** QEMU 3.0.0 has an Integer Overflow because the qga/commands*.c files do not check the length of the argument list or the number of environment variables. NOTE: This has been disputed as not exploitable.
CVE-2019-5008
hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
CVE-2019-8934
hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
CVE-2019-6778
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
CVE-2019-6501
In QEMU 3.1, scsi_handle_inquiry_reply in hw/scsi/scsi-generic.c allows out-of-bounds write and read operations.

Copyright 2019, cxsecurity.com

 

Back to Top