[Forgot Password]
Login  Register Subscribe

23631

 
 

117687

 
 

98218

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-0029

Date: (C)2012-01-27   (M)2017-11-18 


Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

CVSS Score: 7.4Access Vector: ADJACENT_NETWORK
Exploit Score: 4.4Access Complexity: MEDIUM
Impact Score: 10.0Authentication: SINGLE_INSTANCE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECUNIA-47740
SECUNIA-47741
SECUNIA-47992
SECUNIA-48318
SECUNIA-50913
BID-51642
FEDORA-2012-8604
RHSA-2012:0050
RHSA-2012:0370
SUSE-SU-2012:1320
USN-1339-1
http://git.qemu.org/?p=qemu.git;a=log;h=refs/heads/stable-1.0
https://bugzilla.redhat.com/show_bug.cgi?id=772075
openSUSE-SU-2012:0207
qemu-processtxdesc-bo(72656)

CWE    1
CWE-119
OVAL    23
oval:org.secpod.oval:def:103863
oval:org.secpod.oval:def:103471
oval:org.secpod.oval:def:104229
oval:org.secpod.oval:def:500776
...

© 2013 SecPod Technologies