Heap-based buffer overflow in the PCNET controller in QEMU allows remote malicious users to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
qemu qemu |
||
juniper junos space |
||
canonical ubuntu linux 14.10 |
||
canonical ubuntu linux 15.04 |
||
canonical ubuntu linux 12.04 |
||
canonical ubuntu linux 14.04 |
||
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux server aus 6.6 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux eus 6.6 |
||
redhat enterprise linux server tus 6.6 |
||
redhat openstack 5.0 |
||
redhat virtualization 3.0 |
||
fedoraproject fedora 22 |
||
fedoraproject fedora 20 |
||
fedoraproject fedora 21 |
||
suse linux enterprise server 11 |
||
suse linux enterprise desktop 11 |
||
suse linux enterprise debuginfo 11 |
||
suse linux enterprise software development kit 11 |
||
suse linux enterprise server 10 |
||
suse linux enterprise server 12 |
||
suse linux enterprise software development kit 12 |
||
suse linux enterprise desktop 12 |
||
arista eos 4.15 |
||
arista eos 4.14 |
||
arista eos 4.13 |
||
arista eos 4.12 |