CVE-2014-3640

The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

History

13 Feb 2023, 00:41

Type Values Removed Values Added
Summary A NULL pointer dereference flaw was found in the way QEMU handled UDP packets with a source port and address of 0 when QEMU's user networking was in use. A local guest user could use this flaw to crash the guest. The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
References
  • {'url': 'https://access.redhat.com/security/cve/CVE-2014-3640', 'name': 'https://access.redhat.com/security/cve/CVE-2014-3640', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0349', 'name': 'https://access.redhat.com/errata/RHSA-2015:0349', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2015:0624', 'name': 'https://access.redhat.com/errata/RHSA-2015:0624', 'tags': [], 'refsource': 'MISC'}

02 Feb 2023, 20:17

Type Values Removed Values Added
References
  • (MISC) https://access.redhat.com/security/cve/CVE-2014-3640 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0349 -
  • (MISC) https://access.redhat.com/errata/RHSA-2015:0624 -
Summary The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket. A NULL pointer dereference flaw was found in the way QEMU handled UDP packets with a source port and address of 0 when QEMU's user networking was in use. A local guest user could use this flaw to crash the guest.

Information

Published : 2014-11-07 19:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-3640

Mitre link : CVE-2014-3640

CVE.ORG link : CVE-2014-3640


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

debian

  • debian_linux

qemu

  • qemu
CWE
CWE-476

NULL Pointer Dereference