Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-10839

Опубликовано: 16 окт. 2018
Источник: debian
EPSS Низкий

Описание

Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:3.1+dfsg-1package
qemu-kvmremovedpackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03273.html

  • https://www.openwall.com/lists/oss-security/2018/10/08/1

  • https://git.qemu.org/?p=qemu.git;a=commit;h=fdc89e90fac40c5ca2686733df17b6423fb8d8fb

EPSS

Процентиль: 84%
0.02311
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 6 лет назад

Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.

CVSS3: 6.5
redhat
больше 6 лет назад

Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.

CVSS3: 6.5
nvd
больше 6 лет назад

Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.

CVSS3: 6.5
github
около 3 лет назад

Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.

oracle-oval
больше 5 лет назад

ELSA-2019-2892: qemu-kvm security update (IMPORTANT)

EPSS

Процентиль: 84%
0.02311
Низкий