Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8rxf-mc82-x3wv

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

EPSS

Процентиль: 76%
0.01041
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

redhat
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

nvd
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

debian
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e100 ...

oracle-oval
больше 13 лет назад

ELSA-2012-0370: xen security and bug fix update (IMPORTANT)

EPSS

Процентиль: 76%
0.01041
Низкий

Дефекты

CWE-119