5.6
CVSSv3

CVE-2020-11102

Published: 06/04/2020 Updated: 13/05/2020
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.6 | Impact Score: 3.4 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qemu qemu 4.2.0

Vendor Advisories

Debian Bug report logs - #956145 qemu: CVE-2020-11102 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 7 Apr 2020 19:54:02 UTC Severity: grave Tags: security, upstream Found in version qemu/1:42 ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2020-11102 QEMU: tulip: OOB access in tulip_copy_tx_buffers <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: P ...