CVE-2012-6075

Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
References
Link Resource
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html Third Party Advisory
http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0599.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0608.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0609.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0610.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0639.html Third Party Advisory
http://secunia.com/advisories/55082 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201309-24.xml Third Party Advisory
http://www.debian.org/security/2013/dsa-2607 Third Party Advisory
http://www.debian.org/security/2013/dsa-2608 Third Party Advisory
http://www.debian.org/security/2013/dsa-2619 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/12/30/1 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/57420 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1692-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=889301 Issue Tracking Third Party Advisory
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html Third Party Advisory
http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0599.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0608.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0609.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0610.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0639.html Third Party Advisory
http://secunia.com/advisories/55082 Third Party Advisory
http://security.gentoo.org/glsa/glsa-201309-24.xml Third Party Advisory
http://www.debian.org/security/2013/dsa-2607 Third Party Advisory
http://www.debian.org/security/2013/dsa-2608 Third Party Advisory
http://www.debian.org/security/2013/dsa-2619 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/12/30/1 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/57420 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1692-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=889301 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb - () http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb -
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html - Third Party Advisory
References () http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html - Patch, Third Party Advisory () http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html - Patch, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0599.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0599.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0608.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0608.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0609.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0609.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0610.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0610.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0639.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0639.html - Third Party Advisory
References () http://secunia.com/advisories/55082 - Third Party Advisory () http://secunia.com/advisories/55082 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-201309-24.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201309-24.xml - Third Party Advisory
References () http://www.debian.org/security/2013/dsa-2607 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2607 - Third Party Advisory
References () http://www.debian.org/security/2013/dsa-2608 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2608 - Third Party Advisory
References () http://www.debian.org/security/2013/dsa-2619 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2619 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2012/12/30/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2012/12/30/1 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/57420 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/57420 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-1692-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1692-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=889301 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=889301 - Issue Tracking, Third Party Advisory

Information

Published : 2013-02-13 01:55

Updated : 2024-11-21 01:45


NVD link : CVE-2012-6075

Mitre link : CVE-2012-6075

CVE.ORG link : CVE-2012-6075


JSON object : View

Products Affected

fedoraproject

  • fedora

redhat

  • virtualization
  • enterprise_linux_eus
  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_server
  • enterprise_linux
  • enterprise_linux_desktop

suse

  • linux_enterprise_server

qemu

  • qemu

debian

  • debian_linux

canonical

  • ubuntu_linux

opensuse

  • opensuse
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')