7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
29.8%
It was discovered that QEMU incorrectly handled certain VT100 escape
sequences. A guest user with access to an emulated character device could
use this flaw to cause QEMU to crash, or possibly execute arbitrary code on
the host.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 12.04 | noarch | qemu-kvm | < 1.0+noroms-0ubuntu14.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | kvm | < 1:84+dfsg-0ubuntu16+1.0+noroms+0ubuntu14.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu | < 1.0+noroms-0ubuntu14.2 | UNKNOWN |
Ubuntu | 12.04 | noarch | qemu-utils | < 1.0+noroms-0ubuntu14.2 | UNKNOWN |
Ubuntu | 11.10 | noarch | qemu-kvm | < 0.14.1+noroms-0ubuntu6.5 | UNKNOWN |
Ubuntu | 11.10 | noarch | kvm | < 1:84+dfsg-0ubuntu16+0.14.1+noroms+0ubuntu6.5 | UNKNOWN |
Ubuntu | 11.10 | noarch | qemu | < 0.14.1+noroms-0ubuntu6.5 | UNKNOWN |
Ubuntu | 11.04 | noarch | qemu-kvm | < 0.14.0+noroms-0ubuntu4.7 | UNKNOWN |
Ubuntu | 11.04 | noarch | kvm | < 1:84+dfsg-0ubuntu16+0.14.0+noroms+0ubuntu4.7 | UNKNOWN |
Ubuntu | 11.04 | noarch | qemu | < 0.14.0+noroms-0ubuntu4.7 | UNKNOWN |