Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0182

Опубликовано: 04 нояб. 2014
Источник: debian

Описание

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-1package
qemu-kvmremovedpackage
qemuno-dsawheezypackage
qemu-kvmno-dsawheezypackage
qemuend-of-lifesqueezepackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • Fix: http://git.qemu.org/?p=qemu.git;a=commit;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc

  • Regression fix needed: http://git.qemu.org/?p=qemu.git;a=commit;h=2f5732e9648fcddc8759a8fd25c0b41a38352be6

Связанные уязвимости

ubuntu
почти 11 лет назад

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

redhat
больше 11 лет назад

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

nvd
почти 11 лет назад

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

github
около 3 лет назад

Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.

oracle-oval
около 11 лет назад

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)