Description
Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-652-1 | qemu security update |
Debian DLA |
DLA-653-1 | qemu-kvm security update |
Debian DLA |
DLA-1599-1 | qemu security update |
EUVD |
EUVD-2016-8029 | Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet. |
Ubuntu USN |
USN-3125-1 | QEMU vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:50:47.462Z
Reserved: 2016-09-08T00:00:00.000Z
Link: CVE-2016-7161
No data.
Status : Modified
Published: 2016-10-05T16:59:05.743
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-7161
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN