Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3461

Опубликовано: 04 нояб. 2014
Источник: debian
EPSS Низкий

Описание

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-1package
qemu-kvmremovedpackage
qemuno-dsawheezypackage
qemu-kvmno-dsawheezypackage
qemuend-of-lifesqueezepackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • http://article.gmane.org/gmane.comp.emulators.qemu/272322

EPSS

Процентиль: 87%
0.03335
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

redhat
около 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

nvd
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

github
около 3 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

oracle-oval
около 11 лет назад

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 87%
0.03335
Низкий