fkie_cve-2008-0928
Vulnerability from fkie_nvd
Published
2008-03-03 22:44
Modified
2024-11-21 00:43
Severity ?
Summary
Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
cve@mitre.orghttp://marc.info/?l=debian-security&m=120343592917055&w=2
cve@mitre.orghttp://secunia.com/advisories/29081
cve@mitre.orghttp://secunia.com/advisories/29129
cve@mitre.orghttp://secunia.com/advisories/29136
cve@mitre.orghttp://secunia.com/advisories/29172Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29963
cve@mitre.orghttp://secunia.com/advisories/34642
cve@mitre.orghttp://secunia.com/advisories/35031
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1799
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:162
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:016
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0194.html
cve@mitre.orghttp://www.securityfocus.com/bid/28001
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=433560
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=debian-security&m=120343592917055&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29081
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29129
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29136
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29172Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29963
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34642
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35031
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1799
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:016
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0194.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28001
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=433560
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html
Impacted products
Vendor Product Version
qemu qemu 0.1.0
qemu qemu 0.1.1
qemu qemu 0.1.2
qemu qemu 0.1.3
qemu qemu 0.1.4
qemu qemu 0.1.5
qemu qemu 0.1.6
qemu qemu 0.2.0
qemu qemu 0.3.0
qemu qemu 0.4.0
qemu qemu 0.4.1
qemu qemu 0.4.2
qemu qemu 0.4.3
qemu qemu 0.5.0
qemu qemu 0.5.1
qemu qemu 0.5.2
qemu qemu 0.5.3
qemu qemu 0.5.4
qemu qemu 0.5.5
qemu qemu 0.6.0
qemu qemu 0.6.1
qemu qemu 0.7.0
qemu qemu 0.7.1
qemu qemu 0.7.2
qemu qemu 0.8.0
qemu qemu 0.8.1
qemu qemu 0.8.2
qemu qemu 0.9.0
qemu qemu 0.9.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC82CD08-F151-489C-9BC4-50C8C9583718",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75D04344-C6CE-40D5-97ED-42B3DBA1AAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "71CC4D45-66BE-4C23-B541-DD4604ACC9FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E41058D-380C-4098-96FB-53CC158ED420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE12226-C599-45A2-8CFD-32753F94204B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C06F8832-B32F-4352-B048-A4ADCE85373E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5278C685-988B-40D7-9AE9-B4FB8AF41C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6C6B20B-2E5D-4D25-885A-227A4BE5EEBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2FF7251-031D-4A9B-9AF0-1FFE556456D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D942D17-1AA9-4D5A-8F5E-0F4F762522D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A2519BF-5F68-4096-8DE2-2C7BCF7200D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B00BD71-2AE5-47BA-999A-7E89590B86C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6701A9-78CC-49D0-A40A-CB1C774400AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B5A7F2-B5B2-46CF-BBD0-AB986A8E55EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBEBD56F-EFBC-4620-A77C-E215A7AFDAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C45EA44-ECD1-40A7-89CE-D770BDC9DB4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "83088B0F-A6F8-4F47-99C0-09FEA234272F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "17E948D4-6C1A-43D2-B128-1A728FD61703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6470915C-CA3C-42CA-B69B-0FC40A33D02D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "759505BA-6F19-4BAE-8297-D8F30EEC8D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A98CC34-2DB7-46CD-AA60-A7C08DDF22B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E424B63B-DCD8-4209-A4CB-84C1EDF5B255",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9576AA2-2FDD-4063-8D84-DE8DB063AC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "544368B2-37BE-41DD-8DC2-F04B6A394696",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "14A6B570-09CE-4AFF-AC8C-51F37FC79811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC5670FB-B9EA-4B9C-BB7B-575494F12CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27650033-1C9F-4175-A26F-D9082A36F079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1D35E0-2033-4ADE-9ADA-3B45996B53B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6205775B-4A83-498F-A60E-54473F5D5704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine."
    },
    {
      "lang": "es",
      "value": "Qemu 0.9.1 y versiones anteriores no realiza comprobaciones de rango para leer o escribir peticiones en dispositivos bloqueados, lo cual permite a usuarios host invitados con privilegios de root acceder a memoria de su elecci\u00f3n y escapar de la m\u00e1quina virtual.\r\n"
    }
  ],
  "id": "CVE-2008-0928",
  "lastModified": "2024-11-21T00:43:14.867",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-03T22:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=debian-security\u0026m=120343592917055\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29081"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29129"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29136"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29172"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29963"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34642"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35031"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1799"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:016"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0194.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28001"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433560"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=debian-security\u0026m=120343592917055\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35031"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1799"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:162"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0194.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.