Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-14167

Опубликовано: 08 сент. 2017
Источник: nvd
CVSS3: 8.8
CVSS2: 7.2
EPSS Низкий

Описание

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
Версия до 2.10.2 (включая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

EPSS

Процентиль: 32%
0.00118
Низкий

8.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-190

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

CVSS3: 4.9
redhat
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

CVSS3: 8.8
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.8
debian
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c ...

CVSS3: 8.8
github
около 3 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

EPSS

Процентиль: 32%
0.00118
Низкий

8.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-190