Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-1750
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-21 Jun, 2012 | 15:55
Updated At-11 Apr, 2025 | 00:51

Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.4HIGH
AV:A/AC:M/Au:S/C:C/I:C/A:C
Primary2.07.4HIGH
AV:A/AC:M/Au:S/C:C/I:C/A:C
CPE Matches

QEMU
qemu
>>qemu>>0.14.0
cpe:2.3:a:qemu:qemu:0.14.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=52c050236eaa4f0b5e1d160cd66dc18106445c4dsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.htmlsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03015.htmlsecalert@redhat.com
N/A
http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03019.htmlsecalert@redhat.com
N/A
http://lists.opensuse.org/opensuse-updates/2011-05/msg00043.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2011-0534.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/44132secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/44393secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/44658secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/44660secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/44900secalert@redhat.com
Vendor Advisory
http://www.osvdb.org/73756secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/67062secalert@redhat.com
N/A
https://hermes.opensuse.org/messages/8572547secalert@redhat.com
N/A
https://www.debian.org/security/2011/dsa-2230secalert@redhat.com
N/A
https://www.ubuntu.com/usn/USN-1145-1/secalert@redhat.com
N/A
http://git.kernel.org/?p=virt/kvm/qemu-kvm.git%3Ba=commitdiff%3Bh=52c050236eaa4f0b5e1d160cd66dc18106445c4daf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03015.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.gnu.org/archive/html/qemu-devel/2011-03/msg03019.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2011-05/msg00043.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2011-0534.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/44132af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/44393af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/44658af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/44660af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/44900af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/73756af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/67062af854a3a-2127-422b-91ae-364da2661108
N/A
https://hermes.opensuse.org/messages/8572547af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.debian.org/security/2011/dsa-2230af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.ubuntu.com/usn/USN-1145-1/af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found