Qemu

Qemu

422 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 06.11.2015 21:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via ...

  • EPSS 7.85%
  • Veröffentlicht 28.09.2015 16:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.

  • EPSS 1.59%
  • Veröffentlicht 31.08.2015 10:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an inva...

  • EPSS 0.1%
  • Veröffentlicht 26.08.2015 19:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.

  • EPSS 0.39%
  • Veröffentlicht 12.08.2015 14:59:23
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.

  • EPSS 17.52%
  • Veröffentlicht 15.06.2015 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.

  • EPSS 0.09%
  • Veröffentlicht 03.06.2015 20:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly ha...

  • EPSS 30.19%
  • Veröffentlicht 13.05.2015 18:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_...

  • EPSS 0.22%
  • Veröffentlicht 21.04.2015 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite ...

  • EPSS 2.46%
  • Veröffentlicht 12.12.2014 15:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.