Логотип exploitDog
bind:"CVE-2020-10702"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-10702"

Количество 8

Количество 8

ubuntu логотип

CVE-2020-10702

около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2020-10702

около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2020-10702

около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2020-10702

почти 5 лет назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2020-10702

около 5 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authenti ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-g793-9qm5-f3q5

около 3 лет назад

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2021-05173

около 5 лет назад

Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с отсутствием необходимого этапа шифрования, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9034

больше 4 лет назад

ELSA-2021-9034: qemu security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-10702

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-10702

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-10702

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
msrc логотип
CVSS3: 5.5
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2020-10702

A flaw was found in QEMU in the implementation of the Pointer Authenti ...

CVSS3: 5.5
0%
Низкий
около 5 лет назад
github логотип
GHSA-g793-9qm5-f3q5

A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.

CVSS3: 5.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-05173

Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с отсутствием необходимого этапа шифрования, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 5.5
0%
Низкий
около 5 лет назад
oracle-oval логотип
ELSA-2021-9034

ELSA-2021-9034: qemu security update (IMPORTANT)

больше 4 лет назад

Уязвимостей на страницу