First published: Wed Oct 05 2016(Updated: )
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU | <=2.6.2 | |
QEMU | =2.7.0-rc0 | |
QEMU | =2.7.0-rc1 | |
QEMU | =2.7.0-rc2 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7161 is classified as a high severity vulnerability due to its potential for arbitrary code execution on the QEMU host.
To fix CVE-2016-7161, upgrade your QEMU version to 2.7.0 or later, as this version addresses the heap-based buffer overflow.
CVE-2016-7161 affects QEMU versions up to and including 2.6.2 and specific release candidate versions 2.7.0-rc0, 2.7.0-rc1, and 2.7.0-rc2.
CVE-2016-7161 can be exploited by sending a large ethlite packet, leading to a heap-based buffer overflow that allows arbitrary code execution.
CVE-2016-7161 is not exclusive to any operating system but has been noted in QEMU installations on Debian GNU/Linux 8.0.