{
  "threat_severity" : "Moderate",
  "public_date" : "2013-12-03T00:00:00Z",
  "bugzilla" : {
    "description" : "qemu: virtio: insufficient validation of num_sg when mapping",
    "id" : "1066401",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1066401"
  },
  "cvss" : {
    "cvss_base_score" : "3.7",
    "cvss_scoring_vector" : "AV:L/AC:H/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-119",
  "details" : [ "An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process." ],
  "acknowledgement" : "This issue was discovered by Anthony Liguori, Michael Roth, and Michael S. Tsirkin (Red Hat).",
  "affected_release" : [ {
    "product_name" : "OpenStack 3 for RHEL 6",
    "release_date" : "2014-07-24T00:00:00Z",
    "advisory" : "RHSA-2014:0888",
    "cpe" : "cpe:/a:redhat:openstack:3::el6",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.10"
  }, {
    "product_name" : "OpenStack 4 for RHEL 6",
    "release_date" : "2014-07-24T00:00:00Z",
    "advisory" : "RHSA-2014:0888",
    "cpe" : "cpe:/a:redhat:openstack:4::el6",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2014-06-10T00:00:00Z",
    "advisory" : "RHSA-2014:0743",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.415.el6_5.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2014-07-23T00:00:00Z",
    "advisory" : "RHSA-2014:0927",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-60.el7_0.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
    "release_date" : "2014-09-22T00:00:00Z",
    "advisory" : "RHSA-2014:1268",
    "cpe" : "cpe:/a:redhat:openstack:5::el7",
    "package" : "qemu-kvm-rhev-10:1.5.3-60.el7_0.7"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-6",
    "release_date" : "2014-06-10T00:00:00Z",
    "advisory" : "RHSA-2014:0744",
    "cpe" : "cpe:/a:redhat:enterprise_linux:6::hypervisor",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.10"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-6",
    "release_date" : "2014-06-09T00:00:00Z",
    "advisory" : "RHSA-2014:0674",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6::hypervisor",
    "package" : "rhev-hypervisor6-0:6.5-20140603.2.el6ev"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Affected",
    "package_name" : "qemu-kvm-rhev",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-4536\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-4536" ],
  "name" : "CVE-2013-4536",
  "csaw" : false
}