Description
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
CVSS vector
AV:A/AC:M/C:C/I:C/A:CExploitability: 4.4 | Impact: 10.0 Affected Packages3 packages
▶debiandebian/xen< xen 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 (bookworm) ▶Debianxen/xen< 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1+3 🔴Vulnerability Details
2GHSAGHSA-8rxf-mc82-x3wv: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000↗2022-05-04 ▶ OSVCVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000↗2012-01-27 ▶ 📋Vendor Advisories
3UbuntuQEMU vulnerability↗2012-01-23 ▶ Red Hatqemu: e1000: process_tx_desc legacy mode packets heap overflow↗2012-01-23 ▶ DebianCVE-2012-0029: xen - Heap-based buffer overflow in the process_tx_desc function in the e1000 emulatio...↗2012 ▶ 💬Community
3BugzillaCVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [fedora-all]↗2012-05-29 ▶ BugzillaCVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [fedora-all]↗2012-01-23 ▶ BugzillaCVE-2012-0029 qemu: e1000: process_tx_desc legacy mode packets heap overflow↗2012-01-05 ▶