[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-0029Date: (C)2012-01-27   (M)2024-02-22


Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.4
Exploit Score: 4.4
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: ADJACENT_NETWORK
Access Complexity: MEDIUM
Authentication: SINGLE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECUNIA-47740
SECUNIA-47741
SECUNIA-47992
SECUNIA-48318
SECUNIA-50913
BID-51642
FEDORA-2012-8604
RHSA-2012:0050
RHSA-2012:0370
SUSE-SU-2012:1320
USN-1339-1
http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0
https://bugzilla.redhat.com/show_bug.cgi?id=772075
openSUSE-SU-2012:0207
qemu-processtxdesc-bo(72656)

CWE    1
CWE-119
OVAL    24
oval:org.secpod.oval:def:104229
oval:org.secpod.oval:def:104056
oval:org.secpod.oval:def:103471
oval:org.secpod.oval:def:600714
...

© SecPod Technologies