HIGH · 7.5

CVE-2018-17962

Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

Vulnerability Description

Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

CVSS Score

7.5

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
QemuQemu2.1.0
CanonicalUbuntu Linux14.04
DebianDebian Linux8.0
OracleLinux7
RedhatLinux6.0
SuseLinux Enterprise Server11

Related Weaknesses (CWE)

References

FAQ

What is CVE-2018-17962?

CVE-2018-17962 is a vulnerability with a CVSS score of 7.5 (HIGH). Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.

How severe is CVE-2018-17962?

CVE-2018-17962 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2018-17962?

Check the references section above for vendor advisories and patch information. Affected products include: Qemu Qemu, Canonical Ubuntu Linux, Debian Debian Linux, Oracle Linux, Redhat Linux.