Vigil@nce - Qemu: buffer overflow of virtio_load
May 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker, who can alter virtio data, can generate a buffer
overflow in the virtio_load() function of Qemu, in order to
trigger a denial of service, and possibly to execute code.
– Impacted products: Unix (platform)
– Severity: 2/4
– Creation date: 22/04/2014
DESCRIPTION OF THE VULNERABILITY
The qemu environment can use virtual devices with virtio.
The virtio_load() function loads the configuration from the disk.
However, if the size of data is greater than the size of the
storage array, an overflow occurs.
An attacker, who can alter virtio data, can therefore generate a
buffer overflow in the virtio_load() function of Qemu, in order to
trigger a denial of service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Qemu-buffer-overflow-of-virtio-load-14624