[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2012-0029Date: (C)2012-01-27   (M)2018-06-20


Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.4
Exploit Score: 4.4
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: MEDIUM
Authentication: SINGLE_INSTANCE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-47740
SECUNIA-47741
SECUNIA-47992
SECUNIA-48318
SECUNIA-50913
BID-51642
FEDORA-2012-8604
RHSA-2012:0050
RHSA-2012:0370
SUSE-SU-2012:1320
USN-1339-1
http://git.qemu.org/?p=qemu.git;a=log;h=refs/heads/stable-1.0
https://bugzilla.redhat.com/show_bug.cgi?id=772075
openSUSE-SU-2012:0207
qemu-processtxdesc-bo(72656)

CWE    1
CWE-119
OVAL    23
oval:org.secpod.oval:def:104392
oval:org.secpod.oval:def:104302
oval:org.secpod.oval:def:104075
oval:org.secpod.oval:def:104035
...

© SecPod Technologies