First published: Tue Dec 04 2007(Updated: )
QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as demonstrated by qemu-dos.com.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =0.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6227 is considered to have a high severity due to its potential for local users to exploit the buffer overflow in QEMU 0.9.0.
To fix CVE-2007-6227, users should upgrade to a version of QEMU that is not vulnerable to this buffer overflow.
CVE-2007-6227 affects QEMU version 0.9.0 running Windows XP SP2 guest operating systems.
CVE-2007-6227 can enable local users to overwrite the TranslationBlock buffer within the QEMU environment.
CVE-2007-6227 can be exploited by any local user with access to run executable programs on a vulnerable Windows XP SP2 guest system.