Qemu

Qemu

422 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.75%
  • Veröffentlicht 24.12.2008 18:29:15
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 15.10.2008 20:07:42
  • Zuletzt bearbeitet 09.04.2025 00:30:58

qemu-make-debian-root in qemu 0.9.1-5 on Debian GNU/Linux allows local users to overwrite arbitrary files via a symlink attack on temporary files and directories.

  • EPSS 0.09%
  • Veröffentlicht 08.08.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different for...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 12.05.2008 22:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the gue...

  • EPSS 0.08%
  • Veröffentlicht 03.03.2008 22:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

  • EPSS 0.32%
  • Veröffentlicht 04.12.2007 18:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as dem...

  • EPSS 0.04%
  • Veröffentlicht 30.10.2007 22:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" int...

  • EPSS 0.15%
  • Veröffentlicht 30.10.2007 22:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" hea...

  • EPSS 0.14%
  • Veröffentlicht 30.10.2007 22:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used ...

  • EPSS 0.16%
  • Veröffentlicht 02.05.2007 17:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to ...