First published: Thu Dec 20 2012(Updated: )
A buffer overflow flaw was found in the way e1000 emulated device driver of QEMU, a FAST! processor emulator, processed received large e1000 packets, when the SBP and LPE flags were disabled. If the underlying network was configured to allow large (jumbo) packets, a remote attacker could use this flaw to cause relevant guest in question to crash (DoS) or, potentially, the attacker could use this flaw to execute arbitrary code on the guest system with the kernel level privilege. References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051</a> [2] <a href="http://www.openwall.com/lists/oss-security/2012/12/19/9">http://www.openwall.com/lists/oss-security/2012/12/19/9</a> [3] <a href="http://thread.gmane.org/gmane.comp.emulators.qemu/182666">http://thread.gmane.org/gmane.comp.emulators.qemu/182666</a> [4] <a href="http://www.openwall.com/lists/oss-security/2013/01/17/12">http://www.openwall.com/lists/oss-security/2013/01/17/12</a> Relevant upstream patches: [5] <a href="http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb">http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb</a> <a href="http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a">http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | <1.3.0 | |
Fedora | =16 | |
Fedora | =17 | |
Fedora | =18 | |
openSUSE | =12.1 | |
openSUSE | =12.2 | |
SUSE Linux Enterprise Server | =11-sp1 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =5.9 | |
redhat enterprise Linux eus | =6.4 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =5.9 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
Red Hat Enterprise Virtualization | =3.0 | |
Red Hat Enterprise Linux | =6.0 | |
Debian | =6.0 | |
Ubuntu | =10.04 | |
Ubuntu | =11.10 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6075 is classified as a high severity vulnerability due to its potential for remote exploitation through buffer overflow.
To fix CVE-2012-6075, upgrade the QEMU software to version 1.3.0 or later.
CVE-2012-6075 affects multiple versions of QEMU and Fedora, as well as specific versions of openSUSE and Red Hat Enterprise Linux.
CVE-2012-6075 allows remote attackers to execute arbitrary code on systems using affected versions of QEMU.
Yes, CVE-2012-6075 can be exploited over the network by sending specially crafted large packets to an affected QEMU instance.