Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8743

Опубликовано: 29 дек. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.6
CVSS3: 7.1

Описание

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

РелизСтатусПримечание
devel

released

1:2.5+dfsg-1ubuntu5
esm-infra-legacy/trusty

released

2.0.0+dfsg-2ubuntu1.22
precise

DNE

trusty

released

2.0.0+dfsg-2ubuntu1.22
trusty/esm

released

2.0.0+dfsg-2ubuntu1.22
upstream

needs-triage

vivid

ignored

end of life
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

released

1:2.3+dfsg-5ubuntu9.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

released

1.0+noroms-0ubuntu14.27
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

EPSS

Процентиль: 20%
0.00064
Низкий

3.6 Low

CVSS2

7.1 High

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

CVSS3: 7.1
nvd
около 9 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

CVSS3: 7.1
debian
около 9 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation suppo ...

CVSS3: 7.1
github
больше 3 лет назад

QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.

suse-cvrf
почти 10 лет назад

Security update for xen

EPSS

Процентиль: 20%
0.00064
Низкий

3.6 Low

CVSS2

7.1 High

CVSS3