CVE-2012-6075

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.

References

http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb

http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html

http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html

http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html

http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html

http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html

http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html

http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html

http://rhn.redhat.com/errata/RHSA-2013-0599.html

http://rhn.redhat.com/errata/RHSA-2013-0608.html

http://rhn.redhat.com/errata/RHSA-2013-0609.html

http://rhn.redhat.com/errata/RHSA-2013-0610.html

http://rhn.redhat.com/errata/RHSA-2013-0639.html

http://secunia.com/advisories/55082

http://security.gentoo.org/glsa/glsa-201309-24.xml

http://www.debian.org/security/2013/dsa-2607

http://www.debian.org/security/2013/dsa-2608

http://www.debian.org/security/2013/dsa-2619

http://www.openwall.com/lists/oss-security/2012/12/30/1

http://www.securityfocus.com/bid/57420

http://www.ubuntu.com/usn/USN-1692-1

https://bugzilla.redhat.com/show_bug.cgi?id=889301

Details

Source: MITRE

Published: 2013-02-13

Updated: 2020-08-11

Type: CWE-120

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Tenable Plugins

View all (28 total)

IDNameProductFamilySeverity
83616SUSE SLES11 Security Update : Xen (SUSE-SU-2014:0446-1)NessusSuSE Local Security Checks
high
78952RHEL 6 : rhev-hypervisor6 (RHSA-2013:0636)NessusRed Hat Local Security Checks
high
78951RHEL 6 : qemu-kvm-rhev (RHSA-2013:0610)NessusRed Hat Local Security Checks
high
75130openSUSE Security Update : xen (openSUSE-SU-2013:1404-1)NessusSuSE Local Security Checks
high
74967openSUSE Security Update : xen (openSUSE-SU-2013:0637-1)NessusSuSE Local Security Checks
high
74966openSUSE Security Update : xen (openSUSE-SU-2013:0636-1)NessusSuSE Local Security Checks
high
70184GLSA-201309-24 : Xen: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
68780Oracle Linux 6 : qemu-kvm (ELSA-2013-0609)NessusOracle Linux Local Security Checks
high
68779Oracle Linux 5 : kvm (ELSA-2013-0608)NessusOracle Linux Local Security Checks
high
68774Oracle Linux 5 : xen (ELSA-2013-0599)NessusOracle Linux Local Security Checks
high
66133Mandriva Linux Security Advisory : qemu (MDVSA-2013:121)NessusMandriva Local Security Checks
high
65797SuSE 11.2 Security Update : Xen (SAT Patch Number 7492)NessusSuSE Local Security Checks
high
65165CentOS 6 : qemu-kvm (CESA-2013:0609)NessusCentOS Local Security Checks
high
65164CentOS 5 : kvm (CESA-2013:0608)NessusCentOS Local Security Checks
high
65092Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20130307)NessusScientific Linux Local Security Checks
high
65091Scientific Linux Security Update : kvm on SL5.x x86_64 (20130307)NessusScientific Linux Local Security Checks
high
65090Scientific Linux Security Update : xen on SL5.x i386/x86_64 (20130306)NessusScientific Linux Local Security Checks
high
65083RHEL 6 : qemu-kvm (RHSA-2013:0609)NessusRed Hat Local Security Checks
high
65082RHEL 5 : kvm (RHSA-2013:0608)NessusRed Hat Local Security Checks
high
65069RHEL 5 : xen (RHSA-2013:0599)NessusRed Hat Local Security Checks
high
65063CentOS 5 : xen (CESA-2013:0599)NessusCentOS Local Security Checks
high
64553Debian DSA-2619-1 : xen-qemu-dm-4.0 - buffer overflowNessusDebian Local Security Checks
high
64267Fedora 16 : qemu-0.15.1-9.fc16 (2013-0934)NessusFedora Local Security Checks
high
64256Fedora 17 : qemu-1.0.1-3.fc17 (2013-0971)NessusFedora Local Security Checks
high
64255Fedora 18 : qemu-1.2.2-2.fc18 (2013-0965)NessusFedora Local Security Checks
high
63608Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : qemu-kvm vulnerability (USN-1692-1)NessusUbuntu Local Security Checks
high
63557Debian DSA-2608-1 : qemu - buffer overflowNessusDebian Local Security Checks
high
63556Debian DSA-2607-1 : qemu-kvm - buffer overflowNessusDebian Local Security Checks
high