Computer Security
[EN] securityvulns.ru no-pyccku


QEMU memory corruption
Published:04.10.2012
Source:
SecurityVulns ID:12606
Type:local
Threat Level:
5/10
Description:Memory corruption on terminal emulation.
Affected:QEMU : qemu 1.0
CVE:CVE-2012-3515 (Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space.")
Original documentdocumentUBUNTU, [USN-1590-1] QEMU vulnerability (04.10.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod