Buffer overflow in QEMU - CVE-2011-2212
Published: June 21, 2012 / Updated: August 11, 2020
Vulnerability identifier: #VU43970
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2011-2212
CWE-ID: CWE-119
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vendor: QEMU
Affected software:
QEMU
QEMU
Detailed vulnerability description
The vulnerability allows a remote #AU# to execute arbitrary code.
Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to "virtqueue in and out requests."
How to mitigate CVE-2011-2212
Install update from vendor's website.
Sources
- http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00007.html
- http://rhn.redhat.com/errata/RHSA-2011-0919.html
- http://secunia.com/advisories/45158
- http://secunia.com/advisories/45170
- http://secunia.com/advisories/45187
- http://secunia.com/advisories/45188
- http://secunia.com/advisories/45301
- http://secunia.com/advisories/45354
- http://ubuntu.com/usn/usn-1165-1
- http://www.osvdb.org/74751
- https://bugzilla.redhat.com/show_bug.cgi?id=713589
- https://hermes.opensuse.org/messages/9605323
- https://www.debian.org/security/2011/dsa-2282