Описание
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
qemu | fixed | 1:2.3+dfsg-6 | package | |
qemu | fixed | 1.1.2+dfsg-6a+deb7u8 | wheezy | package |
qemu | end-of-life | squeeze | package | |
qemu-kvm | removed | package | ||
qemu-kvm | end-of-life | squeeze | package | |
xen | fixed | 4.4.0-1 | package | |
xen | end-of-life | squeeze | package | |
xen-qemu-dm-4.0 | removed | package | ||
xen-qemu-dm-4.0 | end-of-life | squeeze | package |
Примечания
Xen switched to qemu-system in 4.4.0-1
http://xenbits.xen.org/xsa/advisory-135.html
EPSS
Связанные уязвимости
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
EPSS