Show plain JSON{"id": "CVE-2013-4149", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2014-11-04T21:55:24.093", "references": [{"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=98f93ddd84800f207889491e0b5d851386b459cf", "source": "secalert@redhat.com"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html", "source": "secalert@redhat.com"}, {"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html", "tags": ["Patch"], "source": "secalert@redhat.com"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0927.html", "tags": ["Patch", "Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=98f93ddd84800f207889491e0b5d851386b459cf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://rhn.redhat.com/errata/RHSA-2014-0927.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table."}, {"lang": "es", "value": "Desbordamiento de buffer en la funci\u00f3n virtio_net_load en net/virtio-net.c en QEMU 1.3.0 hasta 1.7.x anterior a 1.7.2 podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una tabla MAC grande."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:qemu:qemu:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29138484-758B-4BD9-8688-8794557EACA3"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.3.0:rc0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "628A0AB2-44C8-4A87-B564-EA8A98DD3366"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.3.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF31E3F3-27B9-45F1-A132-D43516C01DFE"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.3.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6CA6017-71FD-4EB0-98CE-67ABF87BA3A7"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D03CD41F-3E92-4070-88E2-5BE76A26F7BB"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59B3B915-1606-48E4-9EFC-BD9D6A6D404A"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA86C99D-E544-471F-8F8E-94525E600132"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "998961D0-6B1E-4237-AFC3-2E1E4D90BDE3"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35B1E3F1-4647-47FF-9546-0742F10B607B"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0147F4B2-0591-4681-AE24-975AB6A349D9"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97757FF0-D0D6-4BFE-811A-6398D8520D28"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46F126B1-284B-4B3A-8540-1498628C46F8"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E8D5F0C-85F5-46D1-B77C-4A7CCE2D69B6"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "508383F4-B6EE-4C64-AE63-209EA87DF557"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB7A7593-FAC0-4336-84AF-EC367059D5C6"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E8BE223-9122-416D-AA1D-694B19C80A4F"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "331C6EE9-9DA2-4FE1-8446-C9CC21353332"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "383C575E-724D-4F97-9E0C-CDE50499C3D9"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEC5BC38-FFBD-4484-943D-47A0AADD20B8"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59FC829F-2AC7-4CB5-8F03-967906DE9028"}, {"criteria": "cpe:2.3:a:qemu:qemu:1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBB18C9B-B1D6-44A6-A1E9-3D258DE797B8"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}