Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4532

Опубликовано: 02 янв. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.6
CVSS3: 7.8

Описание

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

РелизСтатусПримечание
devel

not-affected

2.1+dfsg-2ubuntu1
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.3
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

end of life
trusty

released

2.0.0+dfsg-2ubuntu1.3
trusty/esm

released

2.0.0+dfsg-2ubuntu1.3
upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

code not present
precise

released

1.0+noroms-0ubuntu14.17
quantal

ignored

end of life
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

needed

Показывать по

EPSS

Процентиль: 39%
0.0017
Низкий

4.6 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

redhat
около 12 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS3: 7.8
nvd
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

CVSS3: 7.8
debian
около 6 лет назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could ...

github
почти 4 года назад

Qemu 1.1.2+dfsg to 2.1+dfsg suffers from a buffer overrun which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process.

EPSS

Процентиль: 39%
0.0017
Низкий

4.6 Medium

CVSS2

7.8 High

CVSS3