HIGH · 7.4

CVE-2012-0029

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU c...

Vulnerability Description

Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.

CVSS Score

7.4

HIGH

AV:A/AC:M/Au:S/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
Kvm GroupQemu-Kvm0.12

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-0029?

CVE-2012-0029 is a vulnerability with a CVSS score of 7.4 (HIGH). Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU c...

How severe is CVE-2012-0029?

CVE-2012-0029 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-0029?

Check the references section above for vendor advisories and patch information. Affected products include: Kvm Group Qemu-Kvm.