CVE-2012-0029Improper Restriction of Operations within the Bounds of a Memory Buffer in Group Qemu-kvm

Severity
7.4HIGHNVD
EPSS
1.0%
top 22.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 27
Latest updateMay 4

Description

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

CVSS vector

AV:A/AC:M/C:C/I:C/A:CExploitability: 4.4 | Impact: 10.0

Affected Packages3 packages

debiandebian/xen< xen 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 (bookworm)
Debianxen/xen< 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1+3

🔴Vulnerability Details

2
GHSA
GHSA-8rxf-mc82-x3wv: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e10002022-05-04
OSV
CVE-2012-0029: Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e10002012-01-27

📋Vendor Advisories

3
Ubuntu
QEMU vulnerability2012-01-23
Red Hat
qemu: e1000: process_tx_desc legacy mode packets heap overflow2012-01-23
Debian
CVE-2012-0029: xen - Heap-based buffer overflow in the process_tx_desc function in the e1000 emulatio...2012

💬Community

3
Bugzilla
CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [fedora-all]2012-05-29
Bugzilla
CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [fedora-all]2012-01-23
Bugzilla
CVE-2012-0029 qemu: e1000: process_tx_desc legacy mode packets heap overflow2012-01-05