cvelist/2014/0xxx/CVE-2014-0222.json

223 lines
9.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2023-02-02 20:00:35 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2019-03-17 21:53:51 +00:00
"CVE_data_meta": {
"ID": "CVE-2014-0222",
2023-02-02 20:00:35 +00:00
"ASSIGNER": "secalert@redhat.com",
2019-03-17 21:53:51 +00:00
"STATE": "PUBLIC"
},
2023-02-02 20:00:35 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"cweId": "CWE-119"
}
]
}
]
},
2019-03-17 21:53:51 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2023-02-02 20:00:35 +00:00
"vendor_name": "Red Hat",
2019-03-17 21:53:51 +00:00
"product": {
"product_data": [
{
2023-02-02 20:00:35 +00:00
"product_name": "OpenStack 4 for RHEL 6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.415.el6_5.14",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.415.el6_5.14",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "10:1.5.3-60.el7_0.5",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.415.el6_5.14",
"version_affected": "!"
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
2019-03-17 21:53:51 +00:00
"version": {
"version_data": [
{
2023-02-02 20:00:35 +00:00
"version_value": "10:1.5.3-60.el7_0.7",
"version_affected": "!"
}
]
}
},
{
"product_name": "RHEV 3.X Hypervisor and Agents for RHEL-6",
"version": {
"version_data": [
{
"version_value": "2:0.12.1.2-2.415.el6_5.14",
"version_affected": "!"
},
{
"version_value": "0:6.5-20140821.1.el6ev",
"version_affected": "!"
2019-03-17 21:53:51 +00:00
}
]
}
}
]
2023-02-02 20:00:35 +00:00
}
2019-03-17 21:53:51 +00:00
}
]
}
},
"references": {
"reference_data": [
{
2023-02-02 20:00:35 +00:00
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html"
},
{
"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html",
"refsource": "MISC",
"name": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:0927",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:0927"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:1268",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1268"
},
{
"url": "http://www.debian.org/security/2014/dsa-3044",
"refsource": "MISC",
"name": "http://www.debian.org/security/2014/dsa-3044"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "https://access.redhat.com/errata/RHSA-2014:1168",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1168"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html",
"refsource": "MISC",
"name": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html",
"refsource": "MISC",
"name": "http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "http://www.securityfocus.com/bid/67357",
"refsource": "MISC",
"name": "http://www.securityfocus.com/bid/67357"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "https://access.redhat.com/errata/RHSA-2014:1075",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1075"
2019-03-17 21:53:51 +00:00
},
{
2023-02-02 20:00:35 +00:00
"url": "https://access.redhat.com/errata/RHSA-2014:1076",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1076"
},
{
"url": "https://access.redhat.com/errata/RHSA-2014:1187",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2014:1187"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2014-0222",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2014-0222"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097216",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1097216"
},
{
"url": "https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02155.html",
"refsource": "MISC",
"name": "https://lists.gnu.org/archive/html/qemu-devel/2014-05/msg02155.html"
}
]
},
"impact": {
"cvss": [
{
"accessComplexity": "HIGH",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.3,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
2019-03-17 21:53:51 +00:00
}
]
}
}