Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - QEMU: integer overflow of qcow1 L2

May 2014 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

An attacker can generate an integer overflow in QEMU via qcow1, in
order to trigger a denial of service, and possibly to execute code.

 Impacted products: Unix (platform)
 Severity: 2/4
 Creation date: 13/05/2014

DESCRIPTION OF THE VULNERABILITY

The QEMU product can load disk images in several formats: qcow,
bochs, etc.

However, the qcow_open() function does not check if the size of
the L2 table is too large, then an allocated memory area is too
short.

An attacker can therefore generate an integer overflow in QEMU via
qcow1, in order to trigger a denial of service, and possibly to
execute code.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/QEMU-integer-overflow-of-qcow1-L2-14730


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts