Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6888

Опубликовано: 10 дек. 2016
Источник: debian
EPSS Низкий

Описание

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.6+dfsg-3.1package
qemunot-affectedwheezypackage
qemu-kvmremovedpackage
qemu-kvmnot-affectedwheezypackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2016-08/msg03176.html

  • http://git.qemu.org/?p=qemu.git;a=commit;h=47882fa4975bf0b58dd74474329fdd7154e8f04c

EPSS

Процентиль: 27%
0.00098
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
около 9 лет назад

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

CVSS3: 3.5
redhat
больше 9 лет назад

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

CVSS3: 4.4
nvd
около 9 лет назад

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

CVSS3: 4.4
github
больше 3 лет назад

Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 27%
0.00098
Низкий