Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-1751

Опубликовано: 21 июн. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.4

Описание

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

РелизСтатусПримечание
dapper

DNE

devel

released

0.14.0+noroms-0ubuntu7
hardy

DNE

lucid

released

0.12.3+noroms-0ubuntu9.9
maverick

released

0.12.5+noroms-0ubuntu7.5
natty

released

0.14.0+noroms-0ubuntu4.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 58%
0.00371
Низкий

7.4 High

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

nvd
около 13 лет назад

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

debian
около 13 лет назад

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Managem ...

github
около 3 лет назад

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

oracle-oval
около 14 лет назад

ELSA-2011-0534: qemu-kvm security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 58%
0.00371
Низкий

7.4 High

CVSS2

Уязвимость CVE-2011-1751