Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-0029

Опубликовано: 23 янв. 2012
Источник: redhat
CVSS2: 7.4
EPSS Низкий

Описание

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmAffected
Red Hat Enterprise Linux 5kvmFixedRHSA-2012:005123.01.2012
Red Hat Enterprise Linux 5xenFixedRHSA-2012:037007.03.2012
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2012:005023.01.2012
RHEV 3.X Hypervisor and Agents for RHEL-6rhev-hypervisor6FixedRHSA-2012:010915.02.2012

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-228->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=772075qemu: e1000: process_tx_desc legacy mode packets heap overflow

EPSS

Процентиль: 76%
0.01041
Низкий

7.4 High

CVSS2

Связанные уязвимости

ubuntu
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

nvd
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

debian
больше 13 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e100 ...

github
около 3 лет назад

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

oracle-oval
больше 13 лет назад

ELSA-2012-0370: xen security and bug fix update (IMPORTANT)

EPSS

Процентиль: 76%
0.01041
Низкий

7.4 High

CVSS2