9.3

CVE-2012-6075

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
QemuQemu Version < 1.3.0
FedoraprojectFedora Version16
FedoraprojectFedora Version17
FedoraprojectFedora Version18
OpensuseOpensuse Version12.1
OpensuseOpensuse Version12.2
SuseLinux Enterprise Server Version11 Updatesp1 SwEditionltss
RedhatEnterprise Linux Eus Version5.9
RedhatEnterprise Linux Eus Version6.4
RedhatVirtualization Version3.0
   RedhatEnterprise Linux Version6.0
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version11.10
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version12.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 5.97% 0.897
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

http://www.securityfocus.com/bid/57420
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=889301
Third Party Advisory
Issue Tracking