Vulnerability Description
The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Libvirt | <= 1.2.21 |
| Xen | Xen | All versions |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/05/24/5Mailing List
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmThird Party Advisory
- http://www.securitytracker.com/id/1035945Third Party AdvisoryVDB Entry
- http://xenbits.xen.org/xsa/advisory-180.htmlVendor Advisory
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=0d968ad715475a1660779bcdd2
- https://libvirt.org/news-2015.htmlRelease NotesVendor Advisory
- http://www.openwall.com/lists/oss-security/2016/05/24/5Mailing List
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.htmThird Party Advisory
- http://www.securitytracker.com/id/1035945Third Party AdvisoryVDB Entry
- http://xenbits.xen.org/xsa/advisory-180.htmlVendor Advisory
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=0d968ad715475a1660779bcdd2
- https://libvirt.org/news-2015.htmlRelease NotesVendor Advisory
FAQ
What is CVE-2014-3672?
CVE-2014-3672 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
How severe is CVE-2014-3672?
CVE-2014-3672 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3672?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Libvirt, Xen Xen.