Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f8hq-r3jp-2m27

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

Ссылки

EPSS

Процентиль: 89%
0.04545
Низкий

Дефекты

CWE-787

Связанные уязвимости

ubuntu
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

redhat
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

nvd
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

debian
около 10 лет назад

Heap-based buffer overflow in the PCNET controller in QEMU allows remo ...

oracle-oval
около 10 лет назад

ELSA-2015-1189: kvm security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04545
Низкий

Дефекты

CWE-787