Unrated severityNVD Advisory· Published Nov 4, 2014· Updated May 6, 2026
CVE-2013-4530
CVE-2013-4530
Description
Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
Affected products
102cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*+ 91 more
- cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*range: <=1.7.1
- cpe:2.3:a:qemu:qemu:0.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0-rc0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0-rc1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0-rc2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.13.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.13.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:rc0:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.15.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.15.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.15.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.15.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:0.9.1-5:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.1:rc4:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:qemu:qemu:1.6.2:*:*:*:*:*:*:*
- osv-coords10 versionspkg:rpm/opensuse/qemu&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 2.6.1-1.5+ 9 more
- (no CPE)range: < 2.6.1-1.5
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.2.5_20-24.9
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
- (no CPE)range: < 4.4.4_02-32.1
- (no CPE)range: < 4.4.4_02-22.19.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.