Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2012-0029
Description:Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Test IDs: 1.3.6.1.4.1.25623.1.0.71131   1.3.6.1.4.1.25623.1.0.864016   1.3.6.1.4.1.25623.1.0.123957   1.3.6.1.4.1.25623.1.0.122009   1.3.6.1.4.1.25623.1.0.71093   1.3.6.1.4.1.25623.1.0.870573   1.3.6.1.4.1.25623.1.0.864289   1.3.6.1.4.1.25623.1.0.840869   1.3.6.1.4.1.25623.1.0.122010   1.3.6.1.4.1.25623.1.0.71072   1.3.6.1.4.1.25623.1.1.4.2012.0127.1   1.3.6.1.4.1.25623.1.0.70723   1.3.6.1.4.1.25623.1.0.123962   1.3.6.1.4.1.25623.1.1.4.2012.0386.1  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2012-0029
47740
http://secunia.com/advisories/47740
47741
http://secunia.com/advisories/47741
47992
http://secunia.com/advisories/47992
48318
http://secunia.com/advisories/48318
50913
http://secunia.com/advisories/50913
51642
http://www.securityfocus.com/bid/51642
FEDORA-2012-8604
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html
RHSA-2012:0050
http://www.redhat.com/support/errata/RHSA-2012-0050.html
RHSA-2012:0370
http://rhn.redhat.com/errata/RHSA-2012-0370.html
SUSE-SU-2012:1320
http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
USN-1339-1
http://www.ubuntu.com/usn/USN-1339-1
http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0
http://git.qemu.org/?p=qemu.git%3Ba=log%3Bh=refs/heads/stable-1.0
https://bugzilla.redhat.com/show_bug.cgi?id=772075
https://bugzilla.redhat.com/show_bug.cgi?id=772075
openSUSE-SU-2012:0207
http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html
qemu-processtxdesc-bo(72656)
https://exchange.xforce.ibmcloud.com/vulnerabilities/72656




© 1998-2025 E-Soft Inc. All rights reserved.