CVE-2008-4539

N/A Unknown
Published: December 29, 2008 Modified: April 23, 2026
View on NVD

Description

Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow. NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://secunia.com/advisories/25073
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/29129
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/33350
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/34642
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35031
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/35062
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2009/dsa-1799
Source: cve@mitre.org
Third Party Advisory
http://www.ubuntu.com/usn/usn-776-1
Source: cve@mitre.org
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=237342
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=448525
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=466890
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/47736
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://groups.google.com/group/linux.debian.changes.devel/msg/9e0dc008572f2867?dmode=source
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/25073
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/29129
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/33350
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/34642
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35031
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35062
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://svn.savannah.gnu.org/viewvc/?view=rev&root=qemu&revision=5587
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1799
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mail-archive.com/cvs-all%40freebsd.org/msg129730.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-776-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=237342
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=448525
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=466890
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/47736
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://launchpad.net/ubuntu/jaunty/+source/qemu/0.9.1+svn20081112-1ubuntu1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.0%
15th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian qemu kvm_qumranet canonical