Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9mpf-qr4j-4fp9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

EPSS

Процентиль: 87%
0.03335
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

redhat
около 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

nvd
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

debian
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrar ...

oracle-oval
около 11 лет назад

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)

EPSS

Процентиль: 87%
0.03335
Низкий

Дефекты

CWE-119