Vulnerability Details : CVE-2013-4344
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Vulnerability category: Overflow
Products affected by CVE-2013-4344
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-4344
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4344
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2013-4344
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4344
-
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
[security-announce] openSUSE-SU-2014:1279-1: important: xen: security anMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
[security-announce] openSUSE-SU-2014:1281-1: important: xen: security anMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1553.html
RHSA-2013:1553 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.openwall.com/lists/oss-security/2013/10/02/2
oss-security - Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflowMailing List;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1754.html
RHSA-2013:1754 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://www.securityfocus.com/bid/62773
QEMU CVE-2013-4344 Remote Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-2092-1
USN-2092-1: QEMU vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://article.gmane.org/gmane.comp.emulators.qemu/237191
Broken Link
Jump to