Lucene search

K
ubuntucveUbuntu.comUB:CVE-2012-6075
HistoryDec 31, 2012 - 12:00 a.m.

CVE-2012-6075

2012-12-3100:00:00
ubuntu.com
ubuntu.com
11

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.023 Low

EPSS

Percentile

89.6%

Buffer overflow in the e1000_receive function in the e1000 device driver
(hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE
flags are disabled, allows remote attackers to cause a denial of service
(guest OS crash) and possibly execute arbitrary guest code via a large
packet.

Bugs

Notes

Author Note
mdeslaur hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary
kees qemu and kvm are only included if the Xen issue is in full-virt mode.
seth-arnold “there will be no more qemu-kvm releases.” – Michael Tokarev qemu patches should apply to xen’s embedded copies
mdeslaur raring is replacing qemu-kvm with qemu (in progress)
OSVersionArchitecturePackageVersionFilename
ubuntu13.04noarchqemu< 1.3.0+dfsg-1~exp3ubuntu3UNKNOWN
ubuntu13.10noarchqemu< 1.3.0+dfsg-1~exp3ubuntu3UNKNOWN
ubuntu10.04noarchqemu-kvm< 0.12.3+noroms-0ubuntu9.21UNKNOWN
ubuntu11.10noarchqemu-kvm< 0.14.1+noroms-0ubuntu6.6UNKNOWN
ubuntu12.04noarchqemu-kvm< 1.0+noroms-0ubuntu14.7UNKNOWN
ubuntu12.10noarchqemu-kvm< 1.2.0+noroms-0ubuntu2.12.10.2UNKNOWN
ubuntu11.10noarchxen< 4.1.1-2ubuntu4.5UNKNOWN
ubuntu12.04noarchxen< 4.1.2-2ubuntu2.5UNKNOWN
ubuntu12.10noarchxen< 4.1.3-3ubuntu1.2UNKNOWN
ubuntu13.04noarchxen< 4.2.0-1ubuntu6UNKNOWN
Rows per page:
1-10 of 111

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.023 Low

EPSS

Percentile

89.6%