An user able to alter the savevm data (either on the disk or over the wire during migration) could use this flaw to to corrupt QEMU process memory on the (destination) host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1066401 | Issue Tracking Patch Third Party Advisory | 
| https://security.netapp.com/advisory/ntap-20210727-0002/ | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1066401 | Issue Tracking Patch Third Party Advisory | 
| https://security.netapp.com/advisory/ntap-20210727-0002/ | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1066401 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://security.netapp.com/advisory/ntap-20210727-0002/ - Third Party Advisory | 
Information
                Published : 2021-05-28 17:15
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4536
Mitre link : CVE-2013-4536
CVE.ORG link : CVE-2013-4536
JSON object : View
Products Affected
                qemu
- qemu
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
