Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702607
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2607-1 (qemu-kvm - buffer overflow)
Summary:It was discovered that the e1000 emulation code in QEMU does not;enforce frame size limits in the same way as the real hardware does.;This could trigger buffer overflows in the guest operating system;driver for that network card, assuming that the host system does not;discard such frames (which it will by default).
Description:Summary:
It was discovered that the e1000 emulation code in QEMU does not
enforce frame size limits in the same way as the real hardware does.
This could trigger buffer overflows in the guest operating system
driver for that network card, assuming that the host system does not
discard such frames (which it will by default).

Affected Software/OS:
qemu-kvm on Debian Linux

Solution:
For the stable distribution (squeeze), this problem has been fixed in
version 0.12.5+dfsg-5+squeeze10.

For the unstable distribution (sid), this problem has been fixed in
version 1.1.2+dfsg-4.

We recommend that you upgrade your qemu-kvm packages.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2012-6075
BugTraq ID: 57420
http://www.securityfocus.com/bid/57420
Debian Security Information: DSA-2607 (Google Search)
http://www.debian.org/security/2013/dsa-2607
Debian Security Information: DSA-2608 (Google Search)
http://www.debian.org/security/2013/dsa-2608
Debian Security Information: DSA-2619 (Google Search)
http://www.debian.org/security/2013/dsa-2619
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html
http://security.gentoo.org/glsa/glsa-201309-24.xml
http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html
http://www.openwall.com/lists/oss-security/2012/12/30/1
RedHat Security Advisories: RHSA-2013:0599
http://rhn.redhat.com/errata/RHSA-2013-0599.html
RedHat Security Advisories: RHSA-2013:0608
http://rhn.redhat.com/errata/RHSA-2013-0608.html
RedHat Security Advisories: RHSA-2013:0609
http://rhn.redhat.com/errata/RHSA-2013-0609.html
RedHat Security Advisories: RHSA-2013:0610
http://rhn.redhat.com/errata/RHSA-2013-0610.html
RedHat Security Advisories: RHSA-2013:0639
http://rhn.redhat.com/errata/RHSA-2013-0639.html
http://secunia.com/advisories/55082
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
SuSE Security Announcement: openSUSE-SU-2013:0636 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
SuSE Security Announcement: openSUSE-SU-2013:0637 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
http://www.ubuntu.com/usn/USN-1692-1
CopyrightCopyright (C) 2013 Greenbone Networks GmbH http://greenbone.net

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.