CVE-2018-17962

Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qemu:qemu:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:qemu:qemu:2.12.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2018/10/08/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2018/10/08/1 - Mailing List, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2892 - () https://access.redhat.com/errata/RHSA-2019:2892 -
References () https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html - Third Party Advisory
References () https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03268.html - Exploit, Mailing List, Third Party Advisory () https://lists.gnu.org/archive/html/qemu-devel/2018-09/msg03268.html - Exploit, Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/3826-1/ - Third Party Advisory () https://usn.ubuntu.com/3826-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4338 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4338 - Third Party Advisory

Information

Published : 2018-10-09 22:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-17962

Mitre link : CVE-2018-17962

CVE.ORG link : CVE-2018-17962


JSON object : View

Products Affected

debian

  • debian_linux

redhat

  • linux

qemu

  • qemu

suse

  • linux_enterprise_server

canonical

  • ubuntu_linux

oracle

  • linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-190

Integer Overflow or Wraparound