Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4002

Опубликовано: 26 апр. 2016
Источник: debian

Описание

Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.6+dfsg-2package
qemuno-dsawheezypackage
qemu-kvmremovedpackage
qemu-kvmno-dsawheezypackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1326082

  • https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html

  • https://www.openwall.com/lists/oss-security/2016/04/11/6

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 10 лет назад

Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.

redhat
почти 10 лет назад

Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.

CVSS3: 9.8
nvd
почти 10 лет назад

Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.

CVSS3: 9.8
github
больше 3 лет назад

Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.

suse-cvrf
больше 9 лет назад

Security update for xen