Qemu

Qemu

425 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.86%
  • Veröffentlicht 23.10.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple use-after-free vulnerabilities in vnc.c in the VNC server in QEMU 0.10.6 and earlier might allow guest OS users to execute arbitrary code on the host OS by establishing a connection from a VNC client and then (1) disconnecting during data tr...

  • EPSS 0.05%
  • Veröffentlicht 29.12.2008 15:24:23
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap over...

Exploit
  • EPSS 21.41%
  • Veröffentlicht 24.12.2008 18:29:15
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.

  • EPSS 0.75%
  • Veröffentlicht 24.12.2008 18:29:15
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in monitor.c in Qemu 0.9.1 might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 15.10.2008 20:07:42
  • Zuletzt bearbeitet 09.04.2025 00:30:58

qemu-make-debian-root in qemu 0.9.1-5 on Debian GNU/Linux allows local users to overwrite arbitrary files via a symlink attack on temporary files and directories.

  • EPSS 0.09%
  • Veröffentlicht 08.08.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different for...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.05.2008 22:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local guest users to read arbitrary files on the host by modifying the header to identify a different format, which is used when the gue...

  • EPSS 0.1%
  • Veröffentlicht 03.03.2008 22:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.

  • EPSS 0.3%
  • Veröffentlicht 04.12.2007 18:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as dem...

  • EPSS 0.04%
  • Veröffentlicht 30.10.2007 22:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to trigger a heap-based buffer overflow via certain register values that bypass sanity checks, aka QEMU NE2000 "receive" int...