Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-764w-ch2j-96hf

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

Ссылки

EPSS

Процентиль: 94%
0.12372
Средний

Дефекты

CWE-908

Связанные уязвимости

ubuntu
около 10 лет назад

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

redhat
около 10 лет назад

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

nvd
около 10 лет назад

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

debian
около 10 лет назад

The C+ mode offload emulation in the RTL8139 network card device model ...

oracle-oval
почти 10 лет назад

ELSA-2015-1833: qemu-kvm security update (MODERATE)

EPSS

Процентиль: 94%
0.12372
Средний

Дефекты

CWE-908