Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3640

Опубликовано: 07 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed2.1+dfsg-5package
qemuend-of-lifesqueezepackage
qemu-kvmremovedpackage
qemu-kvmend-of-lifesqueezepackage

Примечания

  • http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.html

EPSS

Процентиль: 18%
0.00059
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.

redhat
почти 11 лет назад

The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.

nvd
почти 11 лет назад

The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.

github
больше 3 лет назад

The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.

oracle-oval
больше 10 лет назад

ELSA-2015-0349: qemu-kvm security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 18%
0.00059
Низкий