{
  "threat_severity" : "Moderate",
  "public_date" : "2014-05-12T00:00:00Z",
  "bugzilla" : {
    "description" : "Qemu: qcow1: validate image size to avoid out-of-bounds memory access",
    "id" : "1097222",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1097222"
  },
  "cvss" : {
    "cvss_base_score" : "4.3",
    "cvss_scoring_vector" : "AV:A/AC:H/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "cwe" : "CWE-190->CWE-119",
  "details" : [ "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.", "An integer overflow flaw was found in the QEMU block driver for QCOW version 1 disk images. A user able to alter the QEMU disk image files loaded by a guest could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process." ],
  "acknowledgement" : "Red Hat would like to thank NSA for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "OpenStack 4 for RHEL 6",
    "release_date" : "2014-09-15T00:00:00Z",
    "advisory" : "RHSA-2014:1187",
    "cpe" : "cpe:/a:redhat:openstack:4::el6",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.14"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2014-08-19T00:00:00Z",
    "advisory" : "RHSA-2014:1075",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "qemu-kvm-2:0.12.1.2-2.415.el6_5.14"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2014-07-23T00:00:00Z",
    "advisory" : "RHSA-2014:0927",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "qemu-kvm-10:1.5.3-60.el7_0.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6",
    "release_date" : "2014-09-15T00:00:00Z",
    "advisory" : "RHSA-2014:1187",
    "cpe" : "cpe:/a:redhat:openstack:5::el6",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.14"
  }, {
    "product_name" : "Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7",
    "release_date" : "2014-09-22T00:00:00Z",
    "advisory" : "RHSA-2014:1268",
    "cpe" : "cpe:/a:redhat:openstack:5::el7",
    "package" : "qemu-kvm-rhev-10:1.5.3-60.el7_0.7"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-6",
    "release_date" : "2014-08-19T00:00:00Z",
    "advisory" : "RHSA-2014:1076",
    "cpe" : "cpe:/a:redhat:enterprise_linux:6::hypervisor",
    "package" : "qemu-kvm-rhev-2:0.12.1.2-2.415.el6_5.14"
  }, {
    "product_name" : "RHEV 3.X Hypervisor and Agents for RHEL-6",
    "release_date" : "2014-09-09T00:00:00Z",
    "advisory" : "RHSA-2014:1168",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6::hypervisor",
    "package" : "rhev-hypervisor6-0:6.5-20140821.1.el6ev"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "kvm",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-0223\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-0223" ],
  "name" : "CVE-2014-0223",
  "csaw" : false
}