qemu
Page content
- Author: vmiklos
- Vulnerable: 0.9.0-1
- Unaffected: 0.9.0-2terminus1
Tavis Ormandy has reported some vulnerabilities in QEMU, which can be exploited by malicious uses to bypass certain security restrictions or cause a DoS (Denial of Service).
- A boundary error exists within the “cirrus_invalidate_region()” function of the Cirrus video driver, which can be exploited to cause a heap-based buffer overflow.
- The size of ethernet frames is not correctly checked against the “MTU” before being copied into the registers of the NE2000 network driver. This can be exploited to cause a heap-based buffer overflow.
- An integer signedness error when processing data in the NE2000 device registers can be exploited to cause a heap-based buffer overflow. Successful exploitation of 1) through 3) may allow the execution of arbitrary code.
- Errors when handling the “icebp” instruction can be exploited to cause a DoS by terminating the emulation session.
- An error within the handling of the “aam” instruction can result in a division by zero, which can be exploited to cause a DoS.
- Bug Tracker URL: http://bugs.frugalware.org/task/2011