First published: Mon Apr 06 2020(Updated: )
hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
QEMU KVM | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11102 is classified as a high severity vulnerability due to the potential for exploitation through a buffer overflow.
To fix CVE-2020-11102, upgrade QEMU to the latest version beyond 4.2.0 where the vulnerability has been addressed.
CVE-2020-11102 specifically affects QEMU version 4.2.0.
CVE-2020-11102 is a buffer overflow vulnerability caused by inadequate validation of frame size during the copying of tx/rx buffers.
Yes, CVE-2020-11102 can potentially be exploited remotely if an attacker has the ability to send crafted packets to the vulnerable QEMU instance.