Vulnerability & Exploit Database

Displaying all 4 entries

Results for: CVE-2016-7161 Back to search

Ubuntu: USN-3125-1 (CVE-2016-7161): QEMU vulnerabilities Vulnerability

  • Severity: 10
  • Published: October 05, 2016

Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.

SUSE: CVE-2016-7161: SUSE Linux Security Advisory Vulnerability

  • Severity: 10
  • Published: October 05, 2016

Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.

Gentoo Linux: CVE-2016-7161: QEMU: Multiple vulnerabilities Vulnerability

  • Severity: 10
  • Published: October 05, 2016

Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.

Debian: CVE-2016-7161: qemu-kvm - security update Vulnerability

  • Severity: 10
  • Published: October 05, 2016

Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.