Description
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2396-1 | qemu-kvm security update |
Debian DSA |
DSA-2404-1 | xen-qemu-dm-4.0 security update |
EUVD |
EUVD-2012-0069 | Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets. |
Ubuntu USN |
USN-1339-1 | QEMU vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T18:09:17.355Z
Reserved: 2011-12-07T00:00:00.000Z
Link: CVE-2012-0029
No data.
Status : Deferred
Published: 2012-01-27T15:55:04.750
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-0029
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN