Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4532

Опубликовано: 02 янв. 2020
Источник: debian
EPSS Низкий

Описание

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-1package
qemuno-dsasqueezepackage
qemuno-dsawheezypackage
qemu-kvmno-dsawheezypackage
qemu-kvmremovedpackage
qemu-kvmno-dsasqueezepackage

EPSS

Процентиль: 38%
0.0017
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

redhat
около 12 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS3: 7.8
nvd
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

github
почти 4 года назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

EPSS

Процентиль: 38%
0.0017
Низкий