2017-10-16 12:31:07 -04:00
{
2023-02-02 20:01:23 +00:00
"data_version" : "4.0" ,
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
2019-03-17 21:30:02 +00:00
"CVE_data_meta" : {
"ID" : "CVE-2014-7840" ,
2023-02-02 20:01:23 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
2019-03-17 21:30:02 +00:00
"STATE" : "PUBLIC"
} ,
2023-02-02 20:01:23 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "It was found that certain values that were read when loading RAM during migration were not validated. A user able to alter the savevm data (either on the disk or over the wire during migration) could use either of these flaws to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Heap-based Buffer Overflow" ,
"cweId" : "CWE-122"
}
]
}
]
} ,
2019-03-17 21:30:02 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
2023-02-02 20:01:23 +00:00
"vendor_name" : "Red Hat" ,
2019-03-17 21:30:02 +00:00
"product" : {
"product_data" : [
{
2023-02-02 20:01:23 +00:00
"product_name" : "Red Hat Enterprise Linux 7" ,
2019-03-17 21:30:02 +00:00
"version" : {
"version_data" : [
{
2023-02-02 20:01:23 +00:00
"version_value" : "10:1.5.3-86.el7" ,
"version_affected" : "!"
}
]
}
} ,
{
"product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-7" ,
"version" : {
"version_data" : [
{
"version_value" : "10:2.1.2-23.el7" ,
"version_affected" : "!"
2019-03-17 21:30:02 +00:00
}
]
}
}
]
2023-02-02 20:01:23 +00:00
}
2019-03-17 21:30:02 +00:00
}
]
}
} ,
"references" : {
"reference_data" : [
{
2023-02-02 20:01:23 +00:00
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0349.html" ,
"refsource" : "MISC" ,
"name" : "http://rhn.redhat.com/errata/RHSA-2015-0349.html"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2015-0624.html" ,
"refsource" : "MISC" ,
"name" : "http://rhn.redhat.com/errata/RHSA-2015-0624.html"
2019-03-17 21:30:02 +00:00
} ,
{
2023-02-02 20:01:23 +00:00
"url" : "https://access.redhat.com/errata/RHSA-2015:0349" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2015:0349"
2019-03-17 21:30:02 +00:00
} ,
{
2023-02-02 20:01:23 +00:00
"url" : "https://access.redhat.com/errata/RHSA-2015:0624" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2015:0624"
2019-03-17 21:30:02 +00:00
} ,
{
2023-02-02 20:01:23 +00:00
"url" : "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08" ,
"refsource" : "MISC" ,
"name" : "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=0be839a2701369f669532ea5884c15bead1c6e08"
2019-03-17 21:30:02 +00:00
} ,
{
2023-02-02 20:01:23 +00:00
"url" : "http://thread.gmane.org/gmane.comp.emulators.qemu/306117" ,
"refsource" : "MISC" ,
"name" : "http://thread.gmane.org/gmane.comp.emulators.qemu/306117"
2019-03-17 21:30:02 +00:00
} ,
{
2023-02-02 20:01:23 +00:00
"url" : "https://access.redhat.com/security/cve/CVE-2014-7840" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/security/cve/CVE-2014-7840"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1163075" ,
"refsource" : "MISC" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1163075"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99194" ,
"refsource" : "MISC" ,
"name" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/99194"
}
]
} ,
"impact" : {
"cvss" : [
{
"accessComplexity" : "HIGH" ,
"accessVector" : "LOCAL" ,
"authentication" : "NONE" ,
"availabilityImpact" : "PARTIAL" ,
"availabilityRequirement" : "NOT_DEFINED" ,
"baseScore" : 3.7 ,
"collateralDamagePotential" : "NOT_DEFINED" ,
"confidentialityImpact" : "PARTIAL" ,
"confidentialityRequirement" : "NOT_DEFINED" ,
"environmentalScore" : 0 ,
"exploitability" : "NOT_DEFINED" ,
"integrityImpact" : "PARTIAL" ,
"integrityRequirement" : "NOT_DEFINED" ,
"remediationLevel" : "NOT_DEFINED" ,
"reportConfidence" : "NOT_DEFINED" ,
"targetDistribution" : "NOT_DEFINED" ,
"temporalScore" : 0 ,
"vectorString" : "AV:L/AC:H/Au:N/C:P/I:P/A:P" ,
"version" : "2.0"
2019-03-17 21:30:02 +00:00
}
]
}
}