Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0029

Опубликовано: 27 янв. 2012
Источник: debian
EPSS Низкий

Описание

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemu-kvmfixed1.0+dfsg-5package
xen-qemu-dm-4.0removedpackage
xennot-affectedsqueezepackage
xenfixed4.1.3~rc1+hg-20120614.a9c0a89c08f2-1package

EPSS

Процентиль: 76%
0.01041
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

redhat
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

nvd
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

github
около 3 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

oracle-oval
больше 13 лет назад

ELSA-2012-0370: xen security and bug fix update (IMPORTANT)

EPSS

Процентиль: 76%
0.01041
Низкий