Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-234q-mv7h-px9x

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

EPSS

Процентиль: 27%
0.00093
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

redhat
около 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

nvd
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

debian
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU bef ...

oracle-oval
почти 11 лет назад

ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 27%
0.00093
Низкий