{"id":"CVE-2013-4532","details":"Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.","modified":"2026-04-10T03:43:00.675507Z","published":"2020-01-02T16:15:11Z","references":[{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2342-1"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2013-4532"},{"type":"ADVISORY","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532"},{"type":"ADVISORY","url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4532"},{"type":"ADVISORY","url":"https://github.com/qemu/qemu/commit/2e1198672759eda6e122ff38fcf6df06f27e0fe2"},{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2013-4532"},{"type":"ARTICLE","url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739589"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532"},{"type":"FIX","url":"https://github.com/qemu/qemu/commit/2e1198672759eda6e122ff38fcf6df06f27e0fe2"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4532"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4532"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}