7.4
CVSSv2

CVE-2012-0029

Published: 27/01/2012 Updated: 13/02/2023
CVSS v2 Base Score: 7.4 | Impact Score: 10 | Exploitability Score: 4.4
VMScore: 659
Vector: AV:A/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

Vulnerable Product Search on Vulmon Subscribe to Product

kvm group qemu-kvm 0.12

Vendor Advisories

A remote attacker could cause QEMU to crash ...
Synopsis Important: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes multiple security issues andvarious bugs is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impa ...
Synopsis Important: xen security and bug fix update Type/Severity Security Advisory: Important Topic Updated xen packages that fix one security issue and two bugs are nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact A Co ...
Synopsis Important: kvm security update Type/Severity Security Advisory: Important Topic Updated kvm packages that fix two security issues are now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic Updated qemu-kvm packages that fix one security issue, one bug, and addone enhancement are now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this up ...
Nicolae Mogoreanu discovered a heap overflow in the emulated e1000e network interface card of KVM, a solution for full virtualization on x86 hardware, which could result in denial of service or privilege escalation This update also fixes a guest-triggerable memory corruption in VNC handling For the stable distribution (squeeze), this problem has ...
Nicolae Mogoreanu discovered a heap overflow in the emulated e1000e network interface card of QEMU, which is used in the xen-qemu-dm-40 packages This vulnerability might enable to malicious guest systems to crash the host system or escalate their privileges The old stable distribution (lenny) does not contain the xen-qemu-dm-40 package For the ...