Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3461

Опубликовано: 04 нояб. 2014
Источник: ubuntu
Приоритет: low
CVSS2: 6.8

Описание

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

РелизСтатусПримечание
devel

not-affected

2.1+dfsg-2ubuntu1
esm-infra-legacy/trusty

not-affected

2.0.0+dfsg-2ubuntu1.3
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

end of life
trusty

released

2.0.0+dfsg-2ubuntu1.3
trusty/esm

not-affected

2.0.0+dfsg-2ubuntu1.3
upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

code not present
precise

released

1.0+noroms-0ubuntu14.17
quantal

ignored

end of life
saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

needed

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

redhat
около 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

nvd
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

debian
почти 11 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrar ...

github
около 3 лет назад

hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."

oracle-oval
около 11 лет назад

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)

6.8 Medium

CVSS2