Описание
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kvm | Affected | ||
Red Hat Enterprise Linux 5 | kvm | Fixed | RHSA-2012:0051 | 23.01.2012 |
Red Hat Enterprise Linux 5 | xen | Fixed | RHSA-2012:0370 | 07.03.2012 |
Red Hat Enterprise Linux 6 | qemu-kvm | Fixed | RHSA-2012:0050 | 23.01.2012 |
RHEV 3.X Hypervisor and Agents for RHEL-6 | rhev-hypervisor6 | Fixed | RHSA-2012:0109 | 15.02.2012 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.4 High
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e100 ...
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
ELSA-2012-0370: xen security and bug fix update (IMPORTANT)
EPSS
7.4 High
CVSS2