Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-6227Improper Restriction of Operations within the Bounds of a Memory Buffer in Qemu

Severity
7.2HIGHNVD
EPSS
0.3%
top 47.10%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 4
Latest updateMay 1

Description

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as demonstrated by qemu-dos.com.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages2 packages

NVDqemu/qemu0.9.0
debiandebian/qemu

🔴Vulnerability Details

1
GHSA
GHSA-6p9f-vrqh-5hfv: QEMU 02022-05-01

💥Exploits & PoCs

1
Exploit-DB
QEMU 0.9 - Translation Block Local Denial of Service2007-11-30

📋Vendor Advisories

2
Debian
CVE-2007-6227: qemu - QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to over...2007
Red Hat
Non-privileged user can cause the virtual CPU to crash

💬Community

1
Bugzilla
CVE-2007-6227 Non-privileged user can cause the virtual CPU to crash2007-12-06