Vulnerability Details : CVE-2014-3689
The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
Products affected by CVE-2014-3689
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3689
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 23 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3689
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2014-3689
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3689
-
http://www.osvdb.org/114397
404 Not FoundBroken Link
-
https://www.mail-archive.com/qemu-devel%40nongnu.org/msg261580.html
[Qemu-devel] [PATCH v2 0/5] vmware-vga: fix CVE-2014-3689
-
http://secunia.com/advisories/62143
Sign inThird Party Advisory
-
http://www.debian.org/security/2014/dsa-3067
Debian -- Security Information -- DSA-3067-1 qemu-kvmThird Party Advisory
-
http://secunia.com/advisories/60923
Sign inThird Party Advisory
-
http://secunia.com/advisories/62144
Sign inThird Party Advisory
-
http://www.debian.org/security/2014/dsa-3066
Debian -- Security Information -- DSA-3066-1 qemuThird Party Advisory
-
http://www.ubuntu.com/usn/USN-2409-1
USN-2409-1: QEMU vulnerabilities | Ubuntu security noticesThird Party Advisory
Jump to