Lucene search

K
ubuntuUbuntuUSN-1692-1
HistoryJan 16, 2013 - 12:00 a.m.

QEMU vulnerability

2013-01-1600:00:00
ubuntu.com
39

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

Low

0.023 Low

EPSS

Percentile

89.8%

Releases

  • Ubuntu 12.10
  • Ubuntu 12.04
  • Ubuntu 11.10
  • Ubuntu 10.04

Packages

  • qemu-kvm - Machine emulator and virtualizer

Details

It was discovered that QEMU incorrectly handled certain e1000 packet sizes.
In certain environments, an attacker may use this flaw in combination with
large packets to cause a denial of service or execute arbitrary code in the
guest.

OSVersionArchitecturePackageVersionFilename
Ubuntu12.10noarchqemu-kvm< 1.2.0+noroms-0ubuntu2.12.10.2UNKNOWN
Ubuntu12.10noarchkvm< 1:84+dfsg-0ubuntu16+1.2.0+noroms+0ubuntu2.12.10.2UNKNOWN
Ubuntu12.10noarchqemu< 1.2.0+noroms-0ubuntu2.12.10.2UNKNOWN
Ubuntu12.10noarchqemu-utils< 1.2.0+noroms-0ubuntu2.12.10.2UNKNOWN
Ubuntu12.04noarchqemu-kvm< 1.0+noroms-0ubuntu14.7UNKNOWN
Ubuntu12.04noarchkvm< 1:84+dfsg-0ubuntu16+1.0+noroms+0ubuntu14.7UNKNOWN
Ubuntu12.04noarchqemu< 1.0+noroms-0ubuntu14.7UNKNOWN
Ubuntu12.04noarchqemu-utils< 1.0+noroms-0ubuntu14.7UNKNOWN
Ubuntu11.10noarchqemu-kvm< 0.14.1+noroms-0ubuntu6.6UNKNOWN
Ubuntu11.10noarchkvm< 1:84+dfsg-0ubuntu16+0.14.1+noroms+0ubuntu6.6UNKNOWN
Rows per page:
1-10 of 171

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

Low

0.023 Low

EPSS

Percentile

89.8%