The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/60923 | Third Party Advisory | 
| http://secunia.com/advisories/62143 | Third Party Advisory | 
| http://secunia.com/advisories/62144 | Third Party Advisory | 
| http://www.debian.org/security/2014/dsa-3066 | Third Party Advisory | 
| http://www.debian.org/security/2014/dsa-3067 | Third Party Advisory | 
| http://www.osvdb.org/114397 | Broken Link | 
| http://www.ubuntu.com/usn/USN-2409-1 | Third Party Advisory | 
| https://www.mail-archive.com/qemu-devel%40nongnu.org/msg261580.html | |
| http://secunia.com/advisories/60923 | Third Party Advisory | 
| http://secunia.com/advisories/62143 | Third Party Advisory | 
| http://secunia.com/advisories/62144 | Third Party Advisory | 
| http://www.debian.org/security/2014/dsa-3066 | Third Party Advisory | 
| http://www.debian.org/security/2014/dsa-3067 | Third Party Advisory | 
| http://www.osvdb.org/114397 | Broken Link | 
| http://www.ubuntu.com/usn/USN-2409-1 | Third Party Advisory | 
| https://www.mail-archive.com/qemu-devel%40nongnu.org/msg261580.html | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
History
                    21 Nov 2024, 02:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/60923 - Third Party Advisory | |
| References | () http://secunia.com/advisories/62143 - Third Party Advisory | |
| References | () http://secunia.com/advisories/62144 - Third Party Advisory | |
| References | () http://www.debian.org/security/2014/dsa-3066 - Third Party Advisory | |
| References | () http://www.debian.org/security/2014/dsa-3067 - Third Party Advisory | |
| References | () http://www.osvdb.org/114397 - Broken Link | |
| References | () http://www.ubuntu.com/usn/USN-2409-1 - Third Party Advisory | |
| References | () https://www.mail-archive.com/qemu-devel%40nongnu.org/msg261580.html - | 
Information
                Published : 2014-11-14 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-3689
Mitre link : CVE-2014-3689
CVE.ORG link : CVE-2014-3689
JSON object : View
Products Affected
                canonical
- ubuntu_linux
qemu
- qemu
debian
- debian_linux
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
