CVE-2008-0928

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://marc.info/?l=debian-security&m=120343592917055&w=2
http://secunia.com/advisories/29081
http://secunia.com/advisories/29129
http://secunia.com/advisories/29136
http://secunia.com/advisories/29172 Vendor Advisory
http://secunia.com/advisories/29963
http://secunia.com/advisories/34642
http://secunia.com/advisories/35031
http://www.debian.org/security/2009/dsa-1799
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://www.mandriva.com/security/advisories?name=MDVSA-2009:016
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
http://www.redhat.com/support/errata/RHSA-2008-0194.html
http://www.securityfocus.com/bid/28001
https://bugzilla.redhat.com/show_bug.cgi?id=433560
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://marc.info/?l=debian-security&m=120343592917055&w=2
http://secunia.com/advisories/29081
http://secunia.com/advisories/29129
http://secunia.com/advisories/29136
http://secunia.com/advisories/29172 Vendor Advisory
http://secunia.com/advisories/29963
http://secunia.com/advisories/34642
http://secunia.com/advisories/35031
http://www.debian.org/security/2009/dsa-1799
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://www.mandriva.com/security/advisories?name=MDVSA-2009:016
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
http://www.redhat.com/support/errata/RHSA-2008-0194.html
http://www.securityfocus.com/bid/28001
https://bugzilla.redhat.com/show_bug.cgi?id=433560
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html -
References () http://marc.info/?l=debian-security&m=120343592917055&w=2 - () http://marc.info/?l=debian-security&m=120343592917055&w=2 -
References () http://secunia.com/advisories/29081 - () http://secunia.com/advisories/29081 -
References () http://secunia.com/advisories/29129 - () http://secunia.com/advisories/29129 -
References () http://secunia.com/advisories/29136 - () http://secunia.com/advisories/29136 -
References () http://secunia.com/advisories/29172 - Vendor Advisory () http://secunia.com/advisories/29172 - Vendor Advisory
References () http://secunia.com/advisories/29963 - () http://secunia.com/advisories/29963 -
References () http://secunia.com/advisories/34642 - () http://secunia.com/advisories/34642 -
References () http://secunia.com/advisories/35031 - () http://secunia.com/advisories/35031 -
References () http://www.debian.org/security/2009/dsa-1799 - () http://www.debian.org/security/2009/dsa-1799 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:016 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:016 -
References () http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html - () http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html -
References () http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html - () http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0194.html - () http://www.redhat.com/support/errata/RHSA-2008-0194.html -
References () http://www.securityfocus.com/bid/28001 - () http://www.securityfocus.com/bid/28001 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=433560 - () https://bugzilla.redhat.com/show_bug.cgi?id=433560 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html - () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html -

Information

Published : 2008-03-03 22:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-0928

Mitre link : CVE-2008-0928

CVE.ORG link : CVE-2008-0928


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-264

Permissions, Privileges, and Access Controls