Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4151

Опубликовано: 04 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-1package
qemuno-dsawheezypackage
qemuno-dsasqueezepackage
qemu-kvmremovedpackage
qemu-kvmno-dsawheezypackage
qemu-kvmno-dsasqueezepackage

EPSS

Процентиль: 80%
0.01385
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.

redhat
больше 11 лет назад

The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.

nvd
почти 11 лет назад

The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.

github
около 3 лет назад

The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.

oracle-oval
около 11 лет назад

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 80%
0.01385
Низкий