Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:qemu:qemu:2.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "4745807B-A01D-41AE-8996-495176489A63", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.0.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "D583599F-AE5E-40E4-8489-62FD1D0A7845", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "DE70D9B7-F422-455F-8413-CF34342B22AB", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "E3946C39-A3D1-4E2B-9C7D-0654D9A644EA", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "7F858FD1-58A3-46ED-A3C6-64ECEDF8E458", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B3C61AE3-16C8-4EC6-B33D-7E331BEA8F0C", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A47A306F-4E42-467E-ACDA-62028DC93436", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "F7AE8D2A-FD6E-447F-BDC1-6CAAA0DDB9DF", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "8E48B585-A3E2-45FC-AA92-5DB57180B7DC", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B0D54B9C-8C30-4186-A526-CE8AEE6252BA", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "E2F698F7-74B9-4C20-817D-1E8B92460E2D", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "C4B9D60F-DC78-4270-A41D-3C29FF53F4AA", "vulnerable": true}, {"criteria": "cpe:2.3:a:qemu:qemu:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DFAF4478-81BE-4891-8C13-0A8D8FEE46A7", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C84489B-B08C-4854-8A12-D01B6E45CF79", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket."}, {"lang": "es", "value": "La funci\u00f3n sosendto en slirp/udp.c en QEMU anterior a 2.1.2 permite a usuarios locales causar una denegaci\u00f3n de servicio (referencia a puntero nulo) mediante el envi\u00f3 de un paquete udp con un valor de 0 en el pueto y direcci\u00f3n de la fuente, lo que provoca el acceso a un socket no inicializado."}], "evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/476.html\">CWE-476: NULL Pointer Dereference</a>", "id": "CVE-2014-3640", "lastModified": "2024-11-21T02:08:33.737", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-11-07T19:55:02.713", "references": [{"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.html"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04598.html"}, {"source": "secalert@redhat.com", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04707.html"}, {"source": "secalert@redhat.com", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2015-0349.html"}, {"source": "secalert@redhat.com", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2015-0624.html"}, {"source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-3044"}, {"source": "secalert@redhat.com", "tags": ["Third Party Advisory"], "url": "http://www.debian.org/security/2014/dsa-3045"}, {"source": "secalert@redhat.com", "tags": ["Third Party Advisory"], "url": "http://www.ubuntu.com/usn/USN-2409-1"}, {"source": "secalert@redhat.com", "tags": ["Issue Tracking"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144818"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04598.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04707.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2015-0349.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://rhn.redhat.com/errata/RHSA-2015-0624.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3044"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.debian.org/security/2014/dsa-3045"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://www.ubuntu.com/usn/USN-2409-1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Issue Tracking"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1144818"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-476"}], "source": "nvd@nist.gov", "type": "Primary"}]}