CVE-2007-6227

QEMU 0.9.0 allows local users of a Windows XP SP2 guest operating system to overwrite the TranslationBlock (code_gen_buffer) buffer, and probably have unspecified other impacts related to an "overflow," via certain Windows executable programs, as demonstrated by qemu-dos.com.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qemu:qemu:0.9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:39

Type Values Removed Values Added
References () http://secunia.com/advisories/29129 - () http://secunia.com/advisories/29129 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:162 -
References () http://www.securityfocus.com/archive/1/484429/100/0/threaded - () http://www.securityfocus.com/archive/1/484429/100/0/threaded -
References () http://www.securityfocus.com/bid/26666 - () http://www.securityfocus.com/bid/26666 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/38806 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/38806 -

Information

Published : 2007-12-04 18:46

Updated : 2024-11-21 00:39


NVD link : CVE-2007-6227

Mitre link : CVE-2007-6227

CVE.ORG link : CVE-2007-6227


JSON object : View

Products Affected

qemu

  • qemu
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer