Описание
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
Ссылки
- Patch
- Exploit
- Patch
- Exploit
Уязвимые конфигурации
Одно из
EPSS
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
Integer overflow in the qcow_open function in block/qcow.c in QEMU bef ...
Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)
EPSS
4.6 Medium
CVSS2