Vulnerability Description
The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Qemu | Qemu | <= 2.1.3 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 10.04 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/60923Third Party Advisory
- http://secunia.com/advisories/62143Third Party Advisory
- http://secunia.com/advisories/62144Third Party Advisory
- http://www.debian.org/security/2014/dsa-3066Third Party Advisory
- http://www.debian.org/security/2014/dsa-3067Third Party Advisory
- http://www.osvdb.org/114397Broken Link
- http://www.ubuntu.com/usn/USN-2409-1Third Party Advisory
- https://www.mail-archive.com/qemu-devel%40nongnu.org/msg261580.html
- http://secunia.com/advisories/60923Third Party Advisory
- http://secunia.com/advisories/62143Third Party Advisory
- http://secunia.com/advisories/62144Third Party Advisory
- http://www.debian.org/security/2014/dsa-3066Third Party Advisory
- http://www.debian.org/security/2014/dsa-3067Third Party Advisory
- http://www.osvdb.org/114397Broken Link
- http://www.ubuntu.com/usn/USN-2409-1Third Party Advisory
FAQ
What is CVE-2014-3689?
CVE-2014-3689 is a vulnerability with a CVSS score of 7.2 (HIGH). The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
How severe is CVE-2014-3689?
CVE-2014-3689 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3689?
Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Debian Debian Linux, Canonical Ubuntu Linux.