Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4542

Опубликовано: 04 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-1package
qemuno-dsawheezypackage
qemuno-dsasqueezepackage
qemu-kvmno-dsawheezypackage
qemu-kvmremovedpackage
qemu-kvmno-dsasqueezepackage

Примечания

  • virtio-scsi support introduced in v1.1: http://wiki.qemu.org/ChangeLog/1.1

EPSS

Процентиль: 83%
0.02095
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.

redhat
больше 11 лет назад

The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.

nvd
почти 11 лет назад

The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.

github
около 3 лет назад

The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.

oracle-oval
около 11 лет назад

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 83%
0.02095
Низкий