Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rwhm-5hjg-54j9

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

Ссылки

EPSS

Процентиль: 23%
0.00076
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

redhat
почти 13 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

nvd
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."

debian
больше 12 лет назад

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulat ...

oracle-oval
почти 13 лет назад

ELSA-2012-1236: xen security update (IMPORTANT)

EPSS

Процентиль: 23%
0.00076
Низкий

Дефекты

CWE-20