Severity
7.5HIGH
EPSS
0.9%
top 24.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 9
Latest updateMay 13

Description

Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

Debianqemu< 1:3.1+dfsg-1+3
NVDqemu/qemu3.0.1

Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04, 18.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-r358-8j8x-6jhw: Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl81392022-05-13
OSV
CVE-2018-17958: Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl81392018-10-09
CVEList
CVE-2018-17958: Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl81392018-10-09

📋Vendor Advisories

3
Ubuntu
QEMU vulnerabilities2018-11-26
Red Hat
QEMU: rtl8139: integer overflow leads to buffer overflow2018-09-26
Debian
CVE-2018-17958: qemu - Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an ...2018

💬Community

3
Bugzilla
CVE-2018-17958 qemu: rtl8139: integer overflow leads to buffer overflow [fedora-all]2018-10-07
Bugzilla
CVE-2018-17958 QEMU: rtl8139: integer overflow leads to buffer overflow2018-10-07
Bugzilla
CVE-2018-17958 xen: QEMU: rtl8139: integer overflow leads to buffer overflow [fedora-all]2018-10-07