Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2013.0341
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2013-0341)
Summary:The remote host is missing an update for the 'qemu' package(s) announced via the MGASA-2013-0341 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu' package(s) announced via the MGASA-2013-0341 advisory.

Vulnerability Insight:
A buffer overflow flaw was found in the way QEMU processed the SCSI
'REPORT LUNS' command when more than 256 LUNs were specified for a single
SCSI target. A privileged guest user could use this flaw to corrupt QEMU
process memory on the host, which could potentially result in arbitrary
code execution on the host with the privileges of the QEMU process
(CVE-2013-4344).

Affected Software/OS:
'qemu' package(s) on Mageia 2, Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-4344
62773
http://www.securityfocus.com/bid/62773
98028
http://osvdb.org/98028
RHSA-2013:1553
http://rhn.redhat.com/errata/RHSA-2013-1553.html
RHSA-2013:1754
http://rhn.redhat.com/errata/RHSA-2013-1754.html
USN-2092-1
http://www.ubuntu.com/usn/USN-2092-1
[oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow
http://www.openwall.com/lists/oss-security/2013/10/02/2
[qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released
http://article.gmane.org/gmane.comp.emulators.qemu/237191
openSUSE-SU-2014:1279
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
openSUSE-SU-2014:1281
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.