Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4532

Опубликовано: 03 дек. 2013
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

Отчет

Not vulnerable. This issue does not affect the versions of kvm package as shipped with Red Hat Enterprise Linux 5. This issue does not affect the versions of qemu-kvm package as shipped with Red Hat Enterprise Linux 6

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kvmNot affected
Red Hat Enterprise Linux 6qemu-kvmNot affected
Red Hat Enterprise Linux 7qemu-kvmNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1066358qemu: stellaris_enet: buffer overrun on incoming migration

EPSS

Процентиль: 38%
0.0017
Низкий

3.7 Low

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS3: 7.8
nvd
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS3: 7.8
debian
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could ...

github
почти 4 года назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

EPSS

Процентиль: 38%
0.0017
Низкий

3.7 Low

CVSS2