← Voltar para CVEs
CVE-2016-4002
CRITICAL9.8
Descricao
Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/26/2016
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedoraqemu:qemu
Fraquezas (CWE)
CWE-120
Referencias
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/04/11/6(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/04/12/7(secalert@redhat.com)
http://www.securityfocus.com/bid/85992(secalert@redhat.com)
http://www.ubuntu.com/usn/USN-2974-1(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1326082(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html(secalert@redhat.com)
https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html(secalert@redhat.com)
https://security.gentoo.org/glsa/201609-01(secalert@redhat.com)
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183275.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183350.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184209.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/04/11/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2016/04/12/7(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/85992(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-2974-1(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1326082(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01131.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201609-01(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.