Lucene search

K
ubuntuUbuntuUSN-1590-1
HistoryOct 02, 2012 - 12:00 a.m.

QEMU vulnerability

2012-10-0200:00:00
ubuntu.com
33

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.8%

Releases

  • Ubuntu 12.04
  • Ubuntu 11.10
  • Ubuntu 11.04
  • Ubuntu 10.04

Packages

  • qemu-kvm - Machine emulator and virtualizer

Details

It was discovered that QEMU incorrectly handled certain VT100 escape
sequences. A guest user with access to an emulated character device could
use this flaw to cause QEMU to crash, or possibly execute arbitrary code on
the host.

OSVersionArchitecturePackageVersionFilename
Ubuntu12.04noarchqemu-kvm< 1.0+noroms-0ubuntu14.2UNKNOWN
Ubuntu12.04noarchkvm< 1:84+dfsg-0ubuntu16+1.0+noroms+0ubuntu14.2UNKNOWN
Ubuntu12.04noarchqemu< 1.0+noroms-0ubuntu14.2UNKNOWN
Ubuntu12.04noarchqemu-utils< 1.0+noroms-0ubuntu14.2UNKNOWN
Ubuntu11.10noarchqemu-kvm< 0.14.1+noroms-0ubuntu6.5UNKNOWN
Ubuntu11.10noarchkvm< 1:84+dfsg-0ubuntu16+0.14.1+noroms+0ubuntu6.5UNKNOWN
Ubuntu11.10noarchqemu< 0.14.1+noroms-0ubuntu6.5UNKNOWN
Ubuntu11.04noarchqemu-kvm< 0.14.0+noroms-0ubuntu4.7UNKNOWN
Ubuntu11.04noarchkvm< 1:84+dfsg-0ubuntu16+0.14.0+noroms+0ubuntu4.7UNKNOWN
Ubuntu11.04noarchqemu< 0.14.0+noroms-0ubuntu4.7UNKNOWN
Rows per page:
1-10 of 161

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.8%