Page 48 of 348 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash). El Human Monitor Interface support in QEMU permite a los atacantes remotos provocar una denegación de servicio (fallo de escritura y aplicación fuera de límites). • http://www.debian.org/security/2016/dsa-3471 http://www.openwall.com/lists/oss-security/2015/12/23/1 http://www.securityfocus.com/bid/79668 https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html https://security.gentoo.org/glsa/201604-01 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS. QEMU (también conocido como Quick Emulator) construido con un soporte de emulador VMWARE VMXNET3 paravirtual NIC es vulnerable a un problema de caída. Podría ocurrir mientras lee Interrupt Mask Registers (IMR). • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=c6048f849c7e3f009786df76206e895 http://www.debian.org/security/2016/dsa-3471 http://www.openwall.com/lists/oss-security/2016/01/04/4 http://www.openwall.com/lists/oss-security/2016/01/04/7 http://www.securityfocus.com/bid/79822 http://www.securitytracker.com/id/1034575 https://bugzilla.redhat.com/show_bug.cgi?id=1270876 https://security.gentoo.org/glsa/201602-01 • CWE-617: Reachable Assertion •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue. QEMU (también conocido como Quick Emulator) construido con el soporte de invitados TPR optimization for 32-bit Windows es vulnerable a una falla de referencia puntero null. • http://www.debian.org/security/2016/dsa-3469 http://www.debian.org/security/2016/dsa-3470 http://www.debian.org/security/2016/dsa-3471 http://www.openwall.com/lists/oss-security/2016/01/16/1 http://www.openwall.com/lists/oss-security/2016/01/16/6 http://www.securityfocus.com/bid/81058 https://bugzilla.redhat.com/show_bug.cgi?id=1283934 https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg02812.html https://security.gentoo.org/glsa/201604-01 • CWE-476: NULL Pointer Dereference •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method. La compatibilidad MSI-X MMIO en hw/pci/msix.c en QEMU (también conocido como Quick Emulator) permite que usuarios privilegiados invitados locales del sistema operativo provoquen una denegación de servicio (desreferencia de puntero NULL y cierre inesperado del proceso QEMU) aprovechando el error a la hora de definir el método .write. • http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285 http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html http://www.debian.org/security/2016/dsa-3471 http://www.openwall.com/lists/oss-security/2015/12/14/2 http://www.securityfocus.com/bid/80761 https://bugzilla.redhat.com/show_bug.cgi?id=1291137 https://security.gentoo.org/glsa/201602-01 • CWE-476: NULL Pointer Dereference •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command. El desbordamiento de búfer basado en la pila en la función megasas_ctrl_get_info en QEMU, cuando se construye con el soporte de emulación SCSI MegaRAID SAS HBA, permite a los usuarios locales invitados provocar una denegación de servicio (caída de instancia QEMU) a través de un comando CTRL_GET_INFO. • http://www.debian.org/security/2016/dsa-3471 http://www.openwall.com/lists/oss-security/2015/12/22/1 http://www.securityfocus.com/bid/79719 https://bugzilla.redhat.com/show_bug.cgi?id=1284008 https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html https://security.gentoo.org/glsa/201604-01 • CWE-787: Out-of-bounds Write •