Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2016-2198
Disclosure Date: December 29, 2016 (last updated November 25, 2024)
QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
0
Attacker Value
Unknown
CVE-2016-4001
Disclosure Date: May 23, 2016 (last updated November 25, 2024)
Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
0
Attacker Value
Unknown
CVE-2016-4037
Disclosure Date: May 23, 2016 (last updated November 25, 2024)
The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
0
Attacker Value
Unknown
CVE-2016-3712
Disclosure Date: May 11, 2016 (last updated November 25, 2024)
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
0
Attacker Value
Unknown
CVE-2016-3710
Disclosure Date: May 11, 2016 (last updated November 25, 2024)
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
0