Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14167

Опубликовано: 08 сент. 2017
Источник: debian
EPSS Низкий

Описание

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.10.0-1package
qemu-kvmremovedpackage

Примечания

  • https://lists.nongnu.org/archive/html/qemu-devel/2017-09/msg01483.html

  • https://bugzilla.redhat.com/show_bug.cgi?id=1489375

EPSS

Процентиль: 31%
0.00118
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

CVSS3: 4.9
redhat
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

CVSS3: 8.8
nvd
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

CVSS3: 8.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 8.8
github
около 3 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

EPSS

Процентиль: 31%
0.00118
Низкий