9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
7.4 High
AI Score
Confidence
Low
0.023 Low
EPSS
Percentile
89.8%
It was discovered that QEMU incorrectly handled certain e1000 packet sizes.
In certain environments, an attacker may use this flaw in combination with
large packets to cause a denial of service or execute arbitrary code in the
guest.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.10 | noarch | qemu-kvm | < 1.2.0+noroms-0ubuntu2.12.10.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | kvm | < 1:84+dfsg-0ubuntu16+1.2.0+noroms+0ubuntu2.12.10.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | qemu | < 1.2.0+noroms-0ubuntu2.12.10.2 | UNKNOWN |
Ubuntu | 12.10 | noarch | qemu-utils | < 1.2.0+noroms-0ubuntu2.12.10.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu-kvm | < 1.0+noroms-0ubuntu14.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | kvm | < 1:84+dfsg-0ubuntu16+1.0+noroms+0ubuntu14.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu | < 1.0+noroms-0ubuntu14.7 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu-utils | < 1.0+noroms-0ubuntu14.7 | UNKNOWN |
Ubuntu | 11.10 | noarch | qemu-kvm | < 0.14.1+noroms-0ubuntu6.6 | UNKNOWN |
Ubuntu | 11.10 | noarch | kvm | < 1:84+dfsg-0ubuntu16+0.14.1+noroms+0ubuntu6.6 | UNKNOWN |