CVE-2013-4536

An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1066401 Issue Tracking Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20210727-0002/ Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1066401 Issue Tracking Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20210727-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1066401 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1066401 - Issue Tracking, Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20210727-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20210727-0002/ - Third Party Advisory

Information

Published : 2021-05-28 17:15

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4536

Mitre link : CVE-2013-4536

CVE.ORG link : CVE-2013-4536


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-269

Improper Privilege Management