Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-5683

Опубликовано: 23 янв. 2018
Источник: debian
EPSS Низкий

Описание

The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qemufixed1:2.12~rc3+dfsg-1package
qemupostponedwheezypackage
qemu-kvmremovedpackage
qemu-kvmpostponedwheezypackage

Примечания

  • https://lists.gnu.org/archive/html/qemu-devel/2018-01/msg02131.html

EPSS

Процентиль: 27%
0.00091
Низкий

Связанные уязвимости

CVSS3: 6
ubuntu
больше 7 лет назад

The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.

CVSS3: 3
redhat
больше 7 лет назад

The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.

CVSS3: 6
nvd
больше 7 лет назад

The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.

CVSS3: 6
github
около 3 лет назад

The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.

CVSS3: 6
fstec
больше 7 лет назад

Уязвимость функции vga_draw_text эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 27%
0.00091
Низкий